Isaca CISM Practice Test - Questions Answers, Page 42
List of questions
Question 411
Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?
Question 412
Which of the following MUST be established to maintain an effective information security governance framework?
Question 413
An incident response team has established that an application has been breached. Which of the following should be done NEXT?
Question 414
An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
Question 415
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
Question 416
When assigning a risk owner, the MOST important consideration is to ensure the owner has:
Question 417
The MOST useful technique for maintaining management support for the information security program is:
Question 418
Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
Question 419
After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?
Question 420
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
Question