Isaca CISM Practice Test - Questions Answers, Page 50
List of questions
Question 491
What is the PRIMARY objective of implementing standard security configurations?
Question 492
An organization has identified a large volume of old data that appears to be unused. Which of the following should the information security manager do NEXT?
Question 493
When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:
Question 494
Which of the following BEST indicates the effectiveness of the vendor risk management process?
Question 495
Which type of recovery site is MOST reliable and can support stringent recovery requirements?
Question 496
To effectively manage an organization's information security risk, it is MOST important to:
Question 497
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
Question 498
Which of the following provides the MOST useful information for identifying security control gaps on an application server?
Question 499
Which of the following would be MOST helpful when creating information security policies?
Question 500
Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?
Question