CISM Exam Question 381
Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?
CISM Exam Question 382
When evaluating vendors for sensitive data processing, which of the following should be the FIRST step to ensure the correct level of information security is provided?
CISM Exam Question 383
Which of the following is the MOST important input to the development of an effective information security strategy?
CISM Exam Question 384
Which of the following is MOST important to determine following the discovery and eradication of a malware attack?
CISM Exam Question 385
An organization recently activated its business continuity plan (BCP). All employees were notified during the event, but some did not fully follow the communications plan. What is the BEST way to prevent a recurrence?