ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 41

Add to Whishlist

List of questions

Question 401

Report Export Collapse

Which of the following is MOST important when defining how an information security budget should be allocated?

Become a Premium Member for full access
  Unlock Premium Member

Question 402

Report Export Collapse

An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:

Become a Premium Member for full access
  Unlock Premium Member

Question 403

Report Export Collapse

Which of the following is the PRIMARY benefit of an information security awareness training program?

Become a Premium Member for full access
  Unlock Premium Member

Question 404

Report Export Collapse

A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?

Become a Premium Member for full access
  Unlock Premium Member

Question 405

Report Export Collapse

Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 406

Report Export Collapse

Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 407

Report Export Collapse

Which of the following is the GREATEST challenge with assessing emerging risk in an organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 408

Report Export Collapse

Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?

Become a Premium Member for full access
  Unlock Premium Member

Question 409

Report Export Collapse

An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?

Become a Premium Member for full access
  Unlock Premium Member

Question 410

Report Export Collapse

An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81
Search