Isaca CISM Practice Test - Questions Answers, Page 42

List of questions
Question 411

Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?
Question 412

Which of the following MUST be established to maintain an effective information security governance framework?
Question 413

An incident response team has established that an application has been breached. Which of the following should be done NEXT?
Question 414

An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
Question 415

When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
Question 416

When assigning a risk owner, the MOST important consideration is to ensure the owner has:
Question 417

The MOST useful technique for maintaining management support for the information security program is:
Question 418

Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
Question 419

After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?
Question 420

Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
Question