Isaca CISM Practice Test - Questions Answers, Page 46
List of questions
Related questions
Recommendations for enterprise investment in security technology should be PRIMARILY based on:
A business impact analysis (BIA) should be periodically executed PRIMARILY to:
Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
Which of the following factors would have the MOST significant impact on an organization's information security governance mode?
Embedding security responsibilities into job descriptions is important PRIMARILY because it:
Which of the following is the MOST important consideration when updating procedures for managing security devices?
When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
A technical vulnerability assessment on a personnel information management server should be performed when:
Question