Exam Name: | Certified Information Security Manager | ||
Exam Code: | CISM Dumps | ||
Vendor: | Isaca | Certification: | Isaca Certification |
Questions: | 801 Q&A's | Shared By: | mabli |
Which of the following is the FIRST step when conducting a post-incident review?
A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:
An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?