Isaca CISM Practice Test - Questions Answers, Page 36
List of questions
Question 351
Which of the following should be done FIRST when implementing a security program?
Question 352
Which of the following is MOST important to include in an information security status report management?
Question 353
What type of control is being implemented when a security information and event management (SIEM) system is installed?
Question 354
Which of the following is MOST useful to an information security manager when determining the need to escalate an incident to senior?
Question 355
In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or:
Question 356
An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?
Question 357
After a server has been attacked, which of the following is the BEST course of action?
Question 358
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
Question 359
In a call center, the BEST reason to conduct a social engineering is to:
Question 360
To ensure that a new application complies with information security policy, the BEST approach is to:
Question