Isaca CISM Practice Test - Questions Answers, Page 42
List of questions
Related questions
Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?
Which of the following MUST be established to maintain an effective information security governance framework?
An incident response team has established that an application has been breached. Which of the following should be done NEXT?
An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
When assigning a risk owner, the MOST important consideration is to ensure the owner has:
The MOST useful technique for maintaining management support for the information security program is:
Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
Question