CISM Exam Question 116
Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?
CISM Exam Question 117
Which of the following is the BEST way to reduce the risk associated with a successful social engineering attack targeting help desk staff?
CISM Exam Question 118
A post-incident review revealed that key stakeholders took longer than acceptable to decide whether an application should be shut down following a security breach. Which of the following is management's BEST course of action to rectify this issue?
CISM Exam Question 119
Which of the following defines the triggers within a business continuity plan (BCP)?
CISM Exam Question 120
After a ransomware incident, an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?