CISM Exam Question 256
Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?
CISM Exam Question 257
An organization has fallen victim to a spear-phishing attack that compromised the multi-factor authentication code. What is the information security manager's MOST important follow-up action?
CISM Exam Question 258
An anomaly-based intrusion detection system (IDS) operates by gathering data on:
CISM Exam Question 259
Which of the following BEST mitigates the risk or information loss caused by a cloud service provider becoming insolvent?
CISM Exam Question 260
The authorization to transfer the handling of an internal security incident to a third-party support provider is PRIMARILY defined by the: