Which of the following BEST enables successful identification of a potential IT security incident? A. Configuration management standards B. Event correlation C. Network intrusion detection systems (NIDS) D. File integrity monitoring Suggested Answer: B This question is in CISM exam For getting Certified Information Security Manager Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISACA. The website does not contain actual questions and answers from ISACA's Certification Exams. Trademarks, certification & product names are used for reference only and belong to ISACA.
Please login or Register to submit your answer