ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 47

Add to Whishlist

List of questions

Question 461

Report Export Collapse

A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?

Become a Premium Member for full access
  Unlock Premium Member

Question 462

Report Export Collapse

Which of the following would BEST guide the development and maintenance of an information security program?

Become a Premium Member for full access
  Unlock Premium Member

Question 463

Report Export Collapse

Which of the following should be the PRIMARY outcome of an information security program?

Become a Premium Member for full access
  Unlock Premium Member

Question 464

Report Export Collapse

A new regulatory requirement affecting an organization's information security program is released. Which of the following should be the information security manager's FIRST course of action?

Become a Premium Member for full access
  Unlock Premium Member

Question 465

Report Export Collapse

Which of the following is MOST important to maintain integration among the incident response plan, business continuity plan (BCP). and disaster recovery plan (DRP)?

Become a Premium Member for full access
  Unlock Premium Member

Question 466

Report Export Collapse

Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?

Become a Premium Member for full access
  Unlock Premium Member

Question 467

Report Export Collapse

An information security program is BEST positioned for success when it is closely aligned with:

Become a Premium Member for full access
  Unlock Premium Member

Question 468

Report Export Collapse

Which of the following should be established FIRST when implementing an information security governance framework?

Become a Premium Member for full access
  Unlock Premium Member

Question 469

Report Export Collapse

Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?

Become a Premium Member for full access
  Unlock Premium Member

Question 470

Report Export Collapse

An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81
Search