Isaca CISM Question Answer
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
Isaca CISM Summary
- Vendor: Isaca
- Product: CISM
- Update on: Jul 25, 2025
- Questions: 967