CISM Exam Question 36
An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
CISM Exam Question 37
The advantage of sending messages using steganographic techniques, as opposed to utilizing encryption, is that:
CISM Exam Question 38
Which of the following is the BEST metric for evaluating the effectiveness of an intrusion detection mechanism?
CISM Exam Question 39
The value of information assets is BEST determined by:
CISM Exam Question 40
An incident response policy must contain: