Isaca CISM Practice Test - Questions Answers, Page 29
List of questions
Related questions
Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?
Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?
Which of the following is the responsibility of a risk owner?
Which of the following is the MOST important requirement for a successful security program?
A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?
Which risk is introduced when using only sanitized data for the testing of applications?
Which of the following is the BEST method to ensure compliance with password standards?
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
Question