Isaca CISM Practice Test - Questions Answers, Page 22

List of questions
Question 211

Which of the following roles is BEST able to influence the security culture within an organization?
Question 212

Which of the following backup methods requires the MOST time to restore data for an application?
Question 213

The PRIMARY purpose for continuous monitoring of security controls is to ensure:
Question 214

Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?
Question 215

An organization's quality process can BEST support security management by providing:
Question 216

When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?
Question 217

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
Question 218

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
Question 219

An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?
Question 220

The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:
Question