Isaca CISM Practice Test - Questions Answers, Page 40
List of questions
Question 391
Which of the following BEST enables the assignment of risk and control ownership?
Question 392
Which of the following metrics is MOST appropriate for evaluating the incident notification process?
Question 393
Which of the following would BEST support the business case for an increase in the information security budget?
Question 394
Which of the following would BEST enable the timely execution of an incident response plan?
Question 395
Spoofing should be prevented because it may be used to:
Question 396
The PRIMARY consideration when responding to a ransomware attack should be to ensure:
Question 397
An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?
Question 398
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
Question 399
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
Question 400
Which of the following would provide the BEST evidence to senior management that security control performance has improved?
Question