Isaca CISM Practice Test - Questions Answers, Page 48

List of questions
Question 471

Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?
Question 472

During which of the following development phases is it MOST challenging to implement security controls?
Question 473

Which of the following is the MOST important consideration when briefing executives about the current state of the information security program?
Question 474

Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:
Question 475

Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?
Question 476

Which of the following is ESSENTIAL to ensuring effective incident response?
Question 477

Which of the following is the BEST approach for data owners to use when defining access privileges for users?
Question 478

Following an employee security awareness training program, what should be the expected outcome?
Question 479

An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?
Question 480

Which of the following is the BEST way to enhance training for incident response teams?
Question