Isaca CISM Practice Test - Questions Answers, Page 48
List of questions
Question 471
Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?
Question 472
During which of the following development phases is it MOST challenging to implement security controls?
Question 473
Which of the following is the MOST important consideration when briefing executives about the current state of the information security program?
Question 474
Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:
Question 475
Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?
Question 476
Which of the following is ESSENTIAL to ensuring effective incident response?
Question 477
Which of the following is the BEST approach for data owners to use when defining access privileges for users?
Question 478
Following an employee security awareness training program, what should be the expected outcome?
Question 479
An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?
Question 480
Which of the following is the BEST way to enhance training for incident response teams?
Question