ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 35

Add to Whishlist

List of questions

Question 341

Report Export Collapse

Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?

Become a Premium Member for full access
  Unlock Premium Member

Question 342

Report Export Collapse

Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?

Become a Premium Member for full access
  Unlock Premium Member

Question 343

Report Export Collapse

Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 344

Report Export Collapse

An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?

Become a Premium Member for full access
  Unlock Premium Member

Question 345

Report Export Collapse

The contribution of recovery point objective (RPO) to disaster recovery is to:

Become a Premium Member for full access
  Unlock Premium Member

Question 346

Report Export Collapse

Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P

Become a Premium Member for full access
  Unlock Premium Member

Question 347

Report Export Collapse

The PRIMARY goal of the eradication phase in an incident response process is to:

Become a Premium Member for full access
  Unlock Premium Member

Question 348

Report Export Collapse

An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:

* A bad actor broke into a business-critical FTP server by brute forcing an administrative password

* The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored

* The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server

* After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail

Which of the following could have been prevented by conducting regular incident response testing?

Become a Premium Member for full access
  Unlock Premium Member

Question 349

Report Export Collapse

Which of the following is the BEST option to lower the cost to implement application security controls?

Become a Premium Member for full access
  Unlock Premium Member

Question 350

Report Export Collapse

Which of the following would provide the MOST effective security outcome in an organizations contract management process?

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81
Search