Isaca CISM Practice Test - Questions Answers, Page 45
List of questions
Question 441
Who is accountable for approving an information security governance framework?
Question 442
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
Question 443
The GREATEST challenge when attempting data recovery of a specific file during forensic analysis is when:
Question 444
An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?
Question 445
Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?
Question 446
Which of the following is the FIRST step when conducting a post-incident review?
Question 447
Which of the following BEST facilitates the effectiveness of cybersecurity incident response?
Question 448
Which of the following is the MOST important constraint to be considered when developing an information security strategy?
Question 449
An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?
Question 450
What is the role of the information security manager in finalizing contract negotiations with service providers?
Question