ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 40

Add to Whishlist

List of questions

Question 391

Report Export Collapse

Which of the following BEST enables the assignment of risk and control ownership?

Become a Premium Member for full access
  Unlock Premium Member

Question 392

Report Export Collapse

Which of the following metrics is MOST appropriate for evaluating the incident notification process?

Become a Premium Member for full access
  Unlock Premium Member

Question 393

Report Export Collapse

Which of the following would BEST support the business case for an increase in the information security budget?

Become a Premium Member for full access
  Unlock Premium Member

Question 394

Report Export Collapse

Which of the following would BEST enable the timely execution of an incident response plan?

Become a Premium Member for full access
  Unlock Premium Member

Question 395

Report Export Collapse

Spoofing should be prevented because it may be used to:

Become a Premium Member for full access
  Unlock Premium Member

Question 396

Report Export Collapse

The PRIMARY consideration when responding to a ransomware attack should be to ensure:

Become a Premium Member for full access
  Unlock Premium Member

Question 397

Report Export Collapse

An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?

Become a Premium Member for full access
  Unlock Premium Member

Question 398

Report Export Collapse

An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 399

Report Export Collapse

Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?

Become a Premium Member for full access
  Unlock Premium Member

Question 400

Report Export Collapse

Which of the following would provide the BEST evidence to senior management that security control performance has improved?

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81