Isaca CISM Practice Test - Questions Answers, Page 54

List of questions
Question 531

An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
Question 532

Which of the following is the PRIMARY purpose of a business impact analysis (BIA)?
Question 533

Which of the following is the MOST effective way to ensure information security policies are understood?
Question 534

An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
Question 535

Which is MOST important to identify when developing an effective information security strategy?
Question 536

Which of the following presents the GREATEST risk associated with the use of an automated security information and event management (SIEM) system?
Question 537

A security incident has been reported within an organization. When should an information security manager contact the information owner?
Question 538

An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?
Question 539

Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?
Question 540

Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?
Question