Isaca CISM Practice Test - Questions Answers, Page 15
List of questions
Related questions
A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?
Which of the following BEST facilitates effective incident response testing?
An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
When choosing the best controls to mitigate risk to acceptable levels, the information security manager's decision should be MAINLY driven by:
Which of the following MUST happen immediately following the identification of a malware incident?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
A PRIMARY purpose of creating security policies is to:
Which of the following BEST supports information security management in the event of organizational changes in security personnel?
Question