Isaca CISM Practice Test - Questions Answers, Page 29

List of questions
Question 281

Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?
Question 282

Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?
Question 283

Which of the following is the responsibility of a risk owner?
Question 284

Which of the following is the MOST important requirement for a successful security program?
Question 285

A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
Question 286

An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
Question 287

When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?
Question 288

Which risk is introduced when using only sanitized data for the testing of applications?
Question 289

Which of the following is the BEST method to ensure compliance with password standards?
Question 290

Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
Question