Isaca CISM Practice Test - Questions Answers, Page 39

List of questions
Question 381

Which of the following is MOST helpful in determining the criticality of an organization's business functions?
Question 382

An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:
Question 383

Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?
Question 384

Which of the following is BEST used to determine the maturity of an information security program?
Question 385

Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
Question 386

When implementing a security policy for an organization handling personally identifiable information (Pll); the MOST important objective should be:
Question 387

A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
Question 388

Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
Question 389

Which of the following is MOST important to have in place for an organization's information security program to be effective?
Question 390

While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?
Question