Isaca CISM Practice Test - Questions Answers, Page 19
List of questions
Question 181
A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
Question 182
Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?
Question 183
Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
Question 184
Which of the following is the BEST indication of effective information security governance?
Question 185
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
Question 186
Which of the following is a PRIMARY benefit of managed security solutions?
Question 187
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
Question 188
Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?
Question 189
Which of the following defines the triggers within a business continuity plan (BCP)? @
Question 190
Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
Question