ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 22

Add to Whishlist

List of questions

Question 211

Report Export Collapse

Which of the following roles is BEST able to influence the security culture within an organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 212

Report Export Collapse

Which of the following backup methods requires the MOST time to restore data for an application?

Become a Premium Member for full access
  Unlock Premium Member

Question 213

Report Export Collapse

The PRIMARY purpose for continuous monitoring of security controls is to ensure:

Become a Premium Member for full access
  Unlock Premium Member

Question 214

Report Export Collapse

Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?

Become a Premium Member for full access
  Unlock Premium Member

Question 215

Report Export Collapse

An organization's quality process can BEST support security management by providing:

Become a Premium Member for full access
  Unlock Premium Member

Question 216

Report Export Collapse

When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?

Become a Premium Member for full access
  Unlock Premium Member

Question 217

Report Export Collapse

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

Become a Premium Member for full access
  Unlock Premium Member

Question 218

Report Export Collapse

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

Become a Premium Member for full access
  Unlock Premium Member

Question 219

Report Export Collapse

An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?

Become a Premium Member for full access
  Unlock Premium Member

Question 220

Report Export Collapse

The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81