Isaca CISM Practice Test - Questions Answers, Page 24
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 231
 
                            
                            
                                Which of the following BEST determines the allocation of resources during a security incident response?
Question 232
 
                            
                            
                                During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
Question 233
 
                            
                            
                                Which of the following would BEST justify continued investment in an information security program?
Question 234
 
                            
                            
                                An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
Question 235
 
                            
                            
                                Which of the following sources is MOST useful when planning a business-aligned information security program?
Question 236
 
                            
                            
                                When collecting admissible evidence, which of the following is the MOST important requirement?
Question 237
 
                            
                            
                                Which of the following should be the PRIMARY basis for an information security strategy?
Question 238
 
                            
                            
                                An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?
Question 239
 
                            
                            
                                The PRIMARY advantage of single sign-on (SSO) is that it will:
Question 240
 
                            
                            
                                A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question