Isaca CISM Practice Test - Questions Answers, Page 49
List of questions
Related questions
Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
Which of the following is the MOST important outcome of effective risk treatment?
Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?
Which of the following would BEST mitigate accidental data loss events?
Which of the following is the PRIMARY reason to assign a risk owner in an organization?
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?
When integrating security risk management into an organization it is MOST important to ensure:
Question