ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 49

Add to Whishlist

List of questions

Question 481

Report Export Collapse

Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?

Become a Premium Member for full access
  Unlock Premium Member

Question 482

Report Export Collapse

Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?

Become a Premium Member for full access
  Unlock Premium Member

Question 483

Report Export Collapse

Which of the following is the MOST important outcome of effective risk treatment?

Become a Premium Member for full access
  Unlock Premium Member

Question 484

Report Export Collapse

Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 485

Report Export Collapse

Which of the following would BEST mitigate accidental data loss events?

Become a Premium Member for full access
  Unlock Premium Member

Question 486

Report Export Collapse

Which of the following is the PRIMARY reason to assign a risk owner in an organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 487

Report Export Collapse

Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?

Become a Premium Member for full access
  Unlock Premium Member

Question 488

Report Export Collapse

Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?

Become a Premium Member for full access
  Unlock Premium Member

Question 489

Report Export Collapse

An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?

Become a Premium Member for full access
  Unlock Premium Member

Question 490

Report Export Collapse

When integrating security risk management into an organization it is MOST important to ensure:

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81