Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Isaca Certified Information Security Manager CISM Question # 10 Topic 2 Discussion

Isaca Certified Information Security Manager CISM Question # 10 Topic 2 Discussion

CISM Exam Topic 2 Question 10 Discussion:
Question #: 10
Topic #: 2

An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?


A.

Enforce the policy.


B.

Modify the policy.


C.

Present the risk to senior management.


D.

Create an exception for the deviation.


Get Premium CISM Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.