Isaca CISM Practice Test - Questions Answers, Page 47
List of questions
Related questions
A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?
Which of the following would BEST guide the development and maintenance of an information security program?
Which of the following should be the PRIMARY outcome of an information security program?
A new regulatory requirement affecting an organization's information security program is released. Which of the following should be the information security manager's FIRST course of action?
Which of the following is MOST important to maintain integration among the incident response plan, business continuity plan (BCP). and disaster recovery plan (DRP)?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
An information security program is BEST positioned for success when it is closely aligned with:
Which of the following should be established FIRST when implementing an information security governance framework?
Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?
An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?
Question