Isaca CISM Practice Test - Questions Answers, Page 41
List of questions
Related questions
Which of the following is MOST important when defining how an information security budget should be allocated?
An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:
Which of the following is the PRIMARY benefit of an information security awareness training program?
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?
Which of the following is the GREATEST challenge with assessing emerging risk in an organization?
Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?
An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?
An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:
Question