Isaca CISM Practice Test - Questions Answers, Page 49
List of questions
Question 481
Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?
Question 482
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
Question 483
Which of the following is the MOST important outcome of effective risk treatment?
Question 484
Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?
Question 485
Which of the following would BEST mitigate accidental data loss events?
Question 486
Which of the following is the PRIMARY reason to assign a risk owner in an organization?
Question 487
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Question 488
Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
Question 489
An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?
Question 490
When integrating security risk management into an organization it is MOST important to ensure:
Question