Isaca CISM Practice Test - Questions Answers, Page 28

List of questions
Question 271

Reverse lookups can be used to prevent successful:
Question 272

Which of the following is the MOST effective way to prevent information security incidents?
Question 273

Which of the following BEST demonstrates the added value of an information security program?
Question 274

Which of the following should be the FIRST step in developing an information security strategy?
Question 275

Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?
Question 276

An anomaly-based intrusion detection system (IDS) operates by gathering data on:
Question 277

A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
Question 278

Which of the following is the BEST course of action when an online company discovers a network attack in progress?
Question 279

Relationships between critical systems are BEST understood by
Question 280

To help ensure that an information security training program is MOST effective its contents should be
Question