Isaca CISM Practice Test - Questions Answers, Page 40

List of questions
Question 391

Which of the following BEST enables the assignment of risk and control ownership?
Question 392

Which of the following metrics is MOST appropriate for evaluating the incident notification process?
Question 393

Which of the following would BEST support the business case for an increase in the information security budget?
Question 394

Which of the following would BEST enable the timely execution of an incident response plan?
Question 395

Spoofing should be prevented because it may be used to:
Question 396

The PRIMARY consideration when responding to a ransomware attack should be to ensure:
Question 397

An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?
Question 398

An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
Question 399

Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
Question 400

Which of the following would provide the BEST evidence to senior management that security control performance has improved?
Question