ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 58

Add to Whishlist

List of questions

Question 571

Report Export Collapse

An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?

Become a Premium Member for full access
  Unlock Premium Member

Question 572

Report Export Collapse

Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?

Become a Premium Member for full access
  Unlock Premium Member

Question 573

Report Export Collapse

The PRIMARY reason for creating a business case when proposing an information security project is to:

Become a Premium Member for full access
  Unlock Premium Member

Question 574

Report Export Collapse

Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?

Become a Premium Member for full access
  Unlock Premium Member

Question 575

Report Export Collapse

The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:

Become a Premium Member for full access
  Unlock Premium Member

Question 576

Report Export Collapse

A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?

Become a Premium Member for full access
  Unlock Premium Member

Question 577

Report Export Collapse

A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?

Become a Premium Member for full access
  Unlock Premium Member

Question 578

Report Export Collapse

Which of the following is MOST appropriate to communicate to senior management regarding information risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 579

Report Export Collapse

Which of the following is MOST important when designing security controls for new cloud-based services?

Become a Premium Member for full access
  Unlock Premium Member

Question 580

Report Export Collapse

A KEY consideration in the use of quantitative risk analysis is that it:

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81