ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 19

Add to Whishlist

List of questions

Question 181

Report Export Collapse

A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?

Become a Premium Member for full access
  Unlock Premium Member

Question 182

Report Export Collapse

Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?

Become a Premium Member for full access
  Unlock Premium Member

Question 183

Report Export Collapse

Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?

Become a Premium Member for full access
  Unlock Premium Member

Question 184

Report Export Collapse

Which of the following is the BEST indication of effective information security governance?

Become a Premium Member for full access
  Unlock Premium Member

Question 185

Report Export Collapse

Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?

Become a Premium Member for full access
  Unlock Premium Member

Question 186

Report Export Collapse

Which of the following is a PRIMARY benefit of managed security solutions?

Become a Premium Member for full access
  Unlock Premium Member

Question 187

Report Export Collapse

Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?

Become a Premium Member for full access
  Unlock Premium Member

Question 188

Report Export Collapse

Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?

Become a Premium Member for full access
  Unlock Premium Member

Question 189

Report Export Collapse

Which of the following defines the triggers within a business continuity plan (BCP)? @

Become a Premium Member for full access
  Unlock Premium Member

Question 190

Report Export Collapse

Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81