ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 46

Add to Whishlist

List of questions

Question 451

Report Export Collapse

Recommendations for enterprise investment in security technology should be PRIMARILY based on:

Become a Premium Member for full access
  Unlock Premium Member

Question 452

Report Export Collapse

A business impact analysis (BIA) should be periodically executed PRIMARILY to:

Become a Premium Member for full access
  Unlock Premium Member

Question 453

Report Export Collapse

Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?

Become a Premium Member for full access
  Unlock Premium Member

Question 454

Report Export Collapse

During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?

Become a Premium Member for full access
  Unlock Premium Member

Question 455

Report Export Collapse

Which of the following factors would have the MOST significant impact on an organization's information security governance mode?

Become a Premium Member for full access
  Unlock Premium Member

Question 456

Report Export Collapse

Embedding security responsibilities into job descriptions is important PRIMARILY because it:

Become a Premium Member for full access
  Unlock Premium Member

Question 457

Report Export Collapse

Which of the following is the MOST important consideration when updating procedures for managing security devices?

Become a Premium Member for full access
  Unlock Premium Member

Question 458

Report Export Collapse

When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?

Become a Premium Member for full access
  Unlock Premium Member

Question 459

Report Export Collapse

An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?

Become a Premium Member for full access
  Unlock Premium Member

Question 460

Report Export Collapse

A technical vulnerability assessment on a personnel information management server should be performed when:

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81
Search