Isaca CISM Practice Test - Questions Answers, Page 57
List of questions
Related questions
Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?
During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
An internal audit has revealed that a number of information assets have been inappropriately classified. To correct the classifications, the remediation accountability should be assigned to:
Which of the following roles is BEST suited to validate user access requirements during an annual user access review?
When developing an incident escalation process, the BEST approach is to classify incidents based on:
Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?
Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?
Question