Isaca CISM Practice Test - Questions Answers, Page 50

List of questions
Question 491

What is the PRIMARY objective of implementing standard security configurations?
Question 492

An organization has identified a large volume of old data that appears to be unused. Which of the following should the information security manager do NEXT?
Question 493

When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:
Question 494

Which of the following BEST indicates the effectiveness of the vendor risk management process?
Question 495

Which type of recovery site is MOST reliable and can support stringent recovery requirements?
Question 496

To effectively manage an organization's information security risk, it is MOST important to:
Question 497

In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
Question 498

Which of the following provides the MOST useful information for identifying security control gaps on an application server?
Question 499

Which of the following would be MOST helpful when creating information security policies?
Question 500

Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?
Question