Isaca CISM Practice Test - Questions Answers, Page 49

List of questions
Question 481

Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?
Question 482

Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
Question 483

Which of the following is the MOST important outcome of effective risk treatment?
Question 484

Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?
Question 485

Which of the following would BEST mitigate accidental data loss events?
Question 486

Which of the following is the PRIMARY reason to assign a risk owner in an organization?
Question 487

Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Question 488

Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
Question 489

An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?
Question 490

When integrating security risk management into an organization it is MOST important to ensure:
Question