Isaca CISM Practice Test - Questions Answers, Page 54
List of questions
Question 531
An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
Question 532
Which of the following is the PRIMARY purpose of a business impact analysis (BIA)?
Question 533
Which of the following is the MOST effective way to ensure information security policies are understood?
Question 534
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
Question 535
Which is MOST important to identify when developing an effective information security strategy?
Question 536
Which of the following presents the GREATEST risk associated with the use of an automated security information and event management (SIEM) system?
Question 537
A security incident has been reported within an organization. When should an information security manager contact the information owner?
Question 538
An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?
Question 539
Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?
Question 540
Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?
Question