Isaca CISM Practice Test - Questions Answers, Page 45

List of questions
Question 441

Who is accountable for approving an information security governance framework?
Question 442

Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
Question 443

The GREATEST challenge when attempting data recovery of a specific file during forensic analysis is when:
Question 444

An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?
Question 445

Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?
Question 446

Which of the following is the FIRST step when conducting a post-incident review?
Question 447

Which of the following BEST facilitates the effectiveness of cybersecurity incident response?
Question 448

Which of the following is the MOST important constraint to be considered when developing an information security strategy?
Question 449

An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?
Question 450

What is the role of the information security manager in finalizing contract negotiations with service providers?
Question