Isaca CISM Practice Test - Questions Answers, Page 57

List of questions
Question 561

Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?
Question 562

During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?
Question 563

Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
Question 564

An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
Question 565

An internal audit has revealed that a number of information assets have been inappropriately classified. To correct the classifications, the remediation accountability should be assigned to:
Question 566

Which of the following roles is BEST suited to validate user access requirements during an annual user access review?
Question 567

When developing an incident escalation process, the BEST approach is to classify incidents based on:
Question 568

Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
Question 569

Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?
Question 570

Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?
Question