CISM Exam Question 76
Which of the following should be an information security manager's MOST important consideration when determining the priority for implementing security controls?
CISM Exam Question 77
Which of the following should be done FIRST when developing an information security program?
CISM Exam Question 78
A spear phishing attack was used to trick a user into installing a Trojan onto a workstation. Which of the following would have been MOST effective in preventing this attack from succeeding?
CISM Exam Question 79
Which of the following is the BEST option to lower the cost to implement application security controls?
CISM Exam Question 80
Which of the following is the MOST essential task for a chief information security officer (CISO) to perform?