CISM Exam Question 36
Which of the following would BEST help to ensure appropriate security controls are built into software?
CISM Exam Question 37
Which of the following parties should be responsible for determining access levels to an application that processes client information?
CISM Exam Question 38
Which of the following is the PRIMARY responsibility of an information security governance committee?
CISM Exam Question 39
Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?
CISM Exam Question 40
Which of the following is the BEST way to prevent insider threats?