CISM Exam Question 36

An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
  • CISM Exam Question 37

    The advantage of sending messages using steganographic techniques, as opposed to utilizing encryption, is that:
  • CISM Exam Question 38

    Which of the following is the BEST metric for evaluating the effectiveness of an intrusion detection mechanism?
  • CISM Exam Question 39

    The value of information assets is BEST determined by:
  • CISM Exam Question 40

    An incident response policy must contain: