Isaca CISM Practice Test - Questions Answers, Page 35

List of questions
Question 341

Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
Question 342

Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?
Question 343

Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?
Question 344

An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?
Question 345

The contribution of recovery point objective (RPO) to disaster recovery is to:
Question 346

Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P
Question 347

The PRIMARY goal of the eradication phase in an incident response process is to:
Question 348

An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
* A bad actor broke into a business-critical FTP server by brute forcing an administrative password
* The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
* The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
* After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
Question 349

Which of the following is the BEST option to lower the cost to implement application security controls?
Question 350

Which of the following would provide the MOST effective security outcome in an organizations contract management process?
Question