CISM Exam Question 156
An organization's information security strategy should be the PRIMARY input to which of the following?
CISM Exam Question 157
Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?
CISM Exam Question 158
A serious vulnerability was detected in a business application that can be exploited by external attackers to compromise the system. What is the information security manager's BEST course of action?
CISM Exam Question 159
Which of the following activities is designed to handle a control failure that leads to a breach?
CISM Exam Question 160
For an enterprise implementing a bring your own device (BYOD) program, which of the following would provide the BEST security of corporate data residing on unsecured mobile devices?