ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 28

Add to Whishlist

List of questions

Question 271

Report Export Collapse

Reverse lookups can be used to prevent successful:

Become a Premium Member for full access
  Unlock Premium Member

Question 272

Report Export Collapse

Which of the following is the MOST effective way to prevent information security incidents?

Become a Premium Member for full access
  Unlock Premium Member

Question 273

Report Export Collapse

Which of the following BEST demonstrates the added value of an information security program?

Become a Premium Member for full access
  Unlock Premium Member

Question 274

Report Export Collapse

Which of the following should be the FIRST step in developing an information security strategy?

Become a Premium Member for full access
  Unlock Premium Member

Question 275

Report Export Collapse

Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?

Become a Premium Member for full access
  Unlock Premium Member

Question 276

Report Export Collapse

An anomaly-based intrusion detection system (IDS) operates by gathering data on:

Become a Premium Member for full access
  Unlock Premium Member

Question 277

Report Export Collapse

A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?

Become a Premium Member for full access
  Unlock Premium Member

Question 278

Report Export Collapse

Which of the following is the BEST course of action when an online company discovers a network attack in progress?

Become a Premium Member for full access
  Unlock Premium Member

Question 279

Report Export Collapse

Relationships between critical systems are BEST understood by

Become a Premium Member for full access
  Unlock Premium Member

Question 280

Report Export Collapse

To help ensure that an information security training program is MOST effective its contents should be

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81