CISM Exam Question 246
Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?
CISM Exam Question 247
Which of the following information security practices would BEST prevent a SQL injection attack?
CISM Exam Question 248
For which of the following is it MOST important that system administrators be restricted to read- only access?
CISM Exam Question 249
Which of the following is the BEST course of action when an online company discovers a network attack in progress?
CISM Exam Question 250
Which of the following is MOST important to consider when determining the criticality and sensitivity of an information asset?