Isaca CISM Practice Test - Questions Answers, Page 46

List of questions
Question 451

Recommendations for enterprise investment in security technology should be PRIMARILY based on:
Question 452

A business impact analysis (BIA) should be periodically executed PRIMARILY to:
Question 453

Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?
Question 454

During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
Question 455

Which of the following factors would have the MOST significant impact on an organization's information security governance mode?
Question 456

Embedding security responsibilities into job descriptions is important PRIMARILY because it:
Question 457

Which of the following is the MOST important consideration when updating procedures for managing security devices?
Question 458

When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
Question 459

An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
Question 460

A technical vulnerability assessment on a personnel information management server should be performed when:
Question