ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 33

Add to Whishlist

List of questions

Question 321

Report Export Collapse

The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:

Become a Premium Member for full access
  Unlock Premium Member

Question 322

Report Export Collapse

Which of the following is the BEST justification for making a revision to a password policy?

Become a Premium Member for full access
  Unlock Premium Member

Question 323

Report Export Collapse

Which of the following BEST enables an information security manager to obtain organizational support for the implementation of security controls?

Become a Premium Member for full access
  Unlock Premium Member

Question 324

Report Export Collapse

Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?

Become a Premium Member for full access
  Unlock Premium Member

Question 325

Report Export Collapse

Which of the following is the MOST important issue in a penetration test?

Become a Premium Member for full access
  Unlock Premium Member

Question 326

Report Export Collapse

Which of the following is the MOST important consideration when determining which type of failover site to employ?

Become a Premium Member for full access
  Unlock Premium Member

Question 327

Report Export Collapse

What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?

Become a Premium Member for full access
  Unlock Premium Member

Question 328

Report Export Collapse

Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?

Become a Premium Member for full access
  Unlock Premium Member

Question 329

Report Export Collapse

Which of the following roles is MOST appropriate to determine access rights for specific users of an application?

Become a Premium Member for full access
  Unlock Premium Member

Question 330

Report Export Collapse

Which of the following metrics provides the BEST evidence of alignment of information security governance with corporate governance?

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81