Isaca CISM Practice Test - Questions Answers, Page 19

List of questions
Question 181

A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
Question 182

Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?
Question 183

Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
Question 184

Which of the following is the BEST indication of effective information security governance?
Question 185

Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
Question 186

Which of the following is a PRIMARY benefit of managed security solutions?
Question 187

Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
Question 188

Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?
Question 189

Which of the following defines the triggers within a business continuity plan (BCP)? @
Question 190

Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
Question