ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 45

Add to Whishlist

List of questions

Question 441

Report Export Collapse

Who is accountable for approving an information security governance framework?

Become a Premium Member for full access
  Unlock Premium Member

Question 442

Report Export Collapse

Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?

Become a Premium Member for full access
  Unlock Premium Member

Question 443

Report Export Collapse

The GREATEST challenge when attempting data recovery of a specific file during forensic analysis is when:

Become a Premium Member for full access
  Unlock Premium Member

Question 444

Report Export Collapse

An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?

Become a Premium Member for full access
  Unlock Premium Member

Question 445

Report Export Collapse

Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?

Become a Premium Member for full access
  Unlock Premium Member

Question 446

Report Export Collapse

Which of the following is the FIRST step when conducting a post-incident review?

Become a Premium Member for full access
  Unlock Premium Member

Question 447

Report Export Collapse

Which of the following BEST facilitates the effectiveness of cybersecurity incident response?

Become a Premium Member for full access
  Unlock Premium Member

Question 448

Report Export Collapse

Which of the following is the MOST important constraint to be considered when developing an information security strategy?

Become a Premium Member for full access
  Unlock Premium Member

Question 449

Report Export Collapse

An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?

Become a Premium Member for full access
  Unlock Premium Member

Question 450

Report Export Collapse

What is the role of the information security manager in finalizing contract negotiations with service providers?

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81