Isaca CISM Practice Test - Questions Answers, Page 39
List of questions
Related questions
Which of the following is MOST helpful in determining the criticality of an organization's business functions?
An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:
Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?
Which of the following is BEST used to determine the maturity of an information security program?
Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
When implementing a security policy for an organization handling personally identifiable information (Pll); the MOST important objective should be:
A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
Which of the following is MOST important to have in place for an organization's information security program to be effective?
While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?
Question