| Exam Name: | Certified Information Security Manager | ||
| Exam Code: | CISM Dumps | ||
| Vendor: | Isaca | Certification: | Isaca Certification |
| Questions: | 1044 Q&A's | Shared By: | lowen |
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
Which of the following should be the PRIMARY focus of a status report on the information security program to senior management?
Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?