Isaca CISM Practice Test - Questions Answers, Page 22
List of questions
Question 211
Which of the following roles is BEST able to influence the security culture within an organization?
Question 212
Which of the following backup methods requires the MOST time to restore data for an application?
Question 213
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
Question 214
Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?
Question 215
An organization's quality process can BEST support security management by providing:
Question 216
When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?
Question 217
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
Question 218
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
Question 219
An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?
Question 220
The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:
Question