ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 54

Add to Whishlist

List of questions

Question 531

Report Export Collapse

An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?

Become a Premium Member for full access
  Unlock Premium Member

Question 532

Report Export Collapse

Which of the following is the PRIMARY purpose of a business impact analysis (BIA)?

Become a Premium Member for full access
  Unlock Premium Member

Question 533

Report Export Collapse

Which of the following is the MOST effective way to ensure information security policies are understood?

Become a Premium Member for full access
  Unlock Premium Member

Question 534

Report Export Collapse

An organization has remediated a security flaw in a system. Which of the following should be done NEXT?

Become a Premium Member for full access
  Unlock Premium Member

Question 535

Report Export Collapse

Which is MOST important to identify when developing an effective information security strategy?

Become a Premium Member for full access
  Unlock Premium Member

Question 536

Report Export Collapse

Which of the following presents the GREATEST risk associated with the use of an automated security information and event management (SIEM) system?

Become a Premium Member for full access
  Unlock Premium Member

Question 537

Report Export Collapse

A security incident has been reported within an organization. When should an information security manager contact the information owner?

Become a Premium Member for full access
  Unlock Premium Member

Question 538

Report Export Collapse

An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?

Become a Premium Member for full access
  Unlock Premium Member

Question 539

Report Export Collapse

Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?

Become a Premium Member for full access
  Unlock Premium Member

Question 540

Report Export Collapse

Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81