Isaca CISM Practice Test - Questions Answers, Page 31

List of questions
Question 301

An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?
Question 302

What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Question 303

Threat and vulnerability assessments are important PRIMARILY because they are:
Question 304

An organization is aligning its incident response capability with a public cloud service provider. What should be the information security manager's FIRST course of action?
Question 305

Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
Question 306

Which of the following should be the FIRST step in developing an information security strategy?
Question 307

To help ensure that an information security training program is MOST effective, its contents should be:
Question 308

When developing a categorization method for security incidents, the categories MUST:
Question 309

Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?
Question 310

Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?
Question