Isaca CISM Practice Test - Questions Answers, Page 64

List of questions
Question 631

An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
Question 632

An organization's automated security monitoring tool generates an excessively large amount of falsq positives. Which of the following is the BEST method to optimize the monitoring process?
Question 633

A project team member notifies the information security manager of a potential security risk that has not been included in the risk register. Which of the following should the information security manager do FIRST?
Question 634

An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?
Question 635

An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?
Question 636

Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
Question 637

A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?
Question 638

Which of the following is MOST important when developing an information security strategy?
Question 639

Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?
Question 640

An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?
Question