ISACA CISM Certified Information Security Manager Online Training
Question #1 Which of the following MOST effectively prevents internal users from modifying sensitive data? A . Network segmentationB . Role-based access controlsC . Multi-factor authentication -D . Acceptable use policies Reveal Solution Hide SolutionCorrect Answer: B Question #2 A contract bid is digitally signed...