Isaca CISM Practice Test - Questions Answers, Page 10
List of questions
Related questions
Which of the following is the PRIMARY role of an information security manager in a software development project?
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
Which of the following is the FIRST step to establishing an effective information security program?
An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?
The PRIMARY benefit of introducing a single point of administration in network monitoring is that it:
Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?
Question