Isaca CISM Practice Test - Questions Answers, Page 31
List of questions
Question 301
An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?
Question 302
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Question 303
Threat and vulnerability assessments are important PRIMARILY because they are:
Question 304
An organization is aligning its incident response capability with a public cloud service provider. What should be the information security manager's FIRST course of action?
Question 305
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
Question 306
Which of the following should be the FIRST step in developing an information security strategy?
Question 307
To help ensure that an information security training program is MOST effective, its contents should be:
Question 308
When developing a categorization method for security incidents, the categories MUST:
Question 309
Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?
Question 310
Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?
Question