ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 64

Add to Whishlist

List of questions

Question 631

Report Export Collapse

An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?

Become a Premium Member for full access
  Unlock Premium Member

Question 632

Report Export Collapse

An organization's automated security monitoring tool generates an excessively large amount of falsq positives. Which of the following is the BEST method to optimize the monitoring process?

Become a Premium Member for full access
  Unlock Premium Member

Question 633

Report Export Collapse

A project team member notifies the information security manager of a potential security risk that has not been included in the risk register. Which of the following should the information security manager do FIRST?

Become a Premium Member for full access
  Unlock Premium Member

Question 634

Report Export Collapse

An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?

Become a Premium Member for full access
  Unlock Premium Member

Question 635

Report Export Collapse

An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?

Become a Premium Member for full access
  Unlock Premium Member

Question 636

Report Export Collapse

Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?

Become a Premium Member for full access
  Unlock Premium Member

Question 637

Report Export Collapse

A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?

Become a Premium Member for full access
  Unlock Premium Member

Question 638

Report Export Collapse

Which of the following is MOST important when developing an information security strategy?

Become a Premium Member for full access
  Unlock Premium Member

Question 639

Report Export Collapse

Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?

Become a Premium Member for full access
  Unlock Premium Member

Question 640

Report Export Collapse

An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81
Search