ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 43

Add to Whishlist

List of questions

Question 421

Report Export Collapse

To improve the efficiency of the development of a new software application, security requirements should be defined:

Become a Premium Member for full access
  Unlock Premium Member

Question 422

Report Export Collapse

An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:

Become a Premium Member for full access
  Unlock Premium Member

Question 423

Report Export Collapse

Which of the following is the PRIMARY role of the information security manager in application development?

Become a Premium Member for full access
  Unlock Premium Member

Question 424

Report Export Collapse

Which of the following should be an information security manager s MOST important consideration when determining the priority for implementing security controls?

Become a Premium Member for full access
  Unlock Premium Member

Question 425

Report Export Collapse

Which of the following BEST minimizes information security risk in deploying applications to the production environment?

Become a Premium Member for full access
  Unlock Premium Member

Question 426

Report Export Collapse

Which of the following is the BEST way to determine the effectiveness of an incident response plan?

Become a Premium Member for full access
  Unlock Premium Member

Question 427

Report Export Collapse

The PRIMARY goal to a post-incident review should be to:

Become a Premium Member for full access
  Unlock Premium Member

Question 428

Report Export Collapse

A security incident has been reported within an organization When should an information security manager contact the information owner?

Become a Premium Member for full access
  Unlock Premium Member

Question 429

Report Export Collapse

Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?

Become a Premium Member for full access
  Unlock Premium Member

Question 430

Report Export Collapse

Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81