Isaca CISM Practice Test - Questions Answers, Page 28
List of questions
Question 271
Reverse lookups can be used to prevent successful:
Question 272
Which of the following is the MOST effective way to prevent information security incidents?
Question 273
Which of the following BEST demonstrates the added value of an information security program?
Question 274
Which of the following should be the FIRST step in developing an information security strategy?
Question 275
Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?
Question 276
An anomaly-based intrusion detection system (IDS) operates by gathering data on:
Question 277
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
Question 278
Which of the following is the BEST course of action when an online company discovers a network attack in progress?
Question 279
Relationships between critical systems are BEST understood by
Question 280
To help ensure that an information security training program is MOST effective its contents should be
Question