ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 36

Add to Whishlist

List of questions

Question 351

Report Export Collapse

Which of the following should be done FIRST when implementing a security program?

Become a Premium Member for full access
  Unlock Premium Member

Question 352

Report Export Collapse

Which of the following is MOST important to include in an information security status report management?

Become a Premium Member for full access
  Unlock Premium Member

Question 353

Report Export Collapse

What type of control is being implemented when a security information and event management (SIEM) system is installed?

Become a Premium Member for full access
  Unlock Premium Member

Question 354

Report Export Collapse

Which of the following is MOST useful to an information security manager when determining the need to escalate an incident to senior?

Become a Premium Member for full access
  Unlock Premium Member

Question 355

Report Export Collapse

In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or:

Become a Premium Member for full access
  Unlock Premium Member

Question 356

Report Export Collapse

An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?

Become a Premium Member for full access
  Unlock Premium Member

Question 357

Report Export Collapse

After a server has been attacked, which of the following is the BEST course of action?

Become a Premium Member for full access
  Unlock Premium Member

Question 358

Report Export Collapse

Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?

Become a Premium Member for full access
  Unlock Premium Member

Question 359

Report Export Collapse

In a call center, the BEST reason to conduct a social engineering is to:

Become a Premium Member for full access
  Unlock Premium Member

Question 360

Report Export Collapse

To ensure that a new application complies with information security policy, the BEST approach is to:

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81