CISM Exam Question 256

Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?
  • CISM Exam Question 257

    An organization has fallen victim to a spear-phishing attack that compromised the multi-factor authentication code. What is the information security manager's MOST important follow-up action?
  • CISM Exam Question 258

    An anomaly-based intrusion detection system (IDS) operates by gathering data on:
  • CISM Exam Question 259

    Which of the following BEST mitigates the risk or information loss caused by a cloud service provider becoming insolvent?
  • CISM Exam Question 260

    The authorization to transfer the handling of an internal security incident to a third-party support provider is PRIMARILY defined by the: