Isaca CISM Practice Test - Questions Answers, Page 45
List of questions
Related questions
Who is accountable for approving an information security governance framework?
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
The GREATEST challenge when attempting data recovery of a specific file during forensic analysis is when:
An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?
Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?
Which of the following is the FIRST step when conducting a post-incident review?
Which of the following BEST facilitates the effectiveness of cybersecurity incident response?
Which of the following is the MOST important constraint to be considered when developing an information security strategy?
An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?
What is the role of the information security manager in finalizing contract negotiations with service providers?
Question