ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 69

Add to Whishlist

List of questions

Question 681

Report Export Collapse

Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?

Become a Premium Member for full access
  Unlock Premium Member

Question 682

Report Export Collapse

The results of a risk assessment for a potential network reconfiguration reveal a high likelihood of sensitive data being compromised. What is the information security manager's BEST course of action?

Become a Premium Member for full access
  Unlock Premium Member

Question 683

Report Export Collapse

Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?

Become a Premium Member for full access
  Unlock Premium Member

Question 684

Report Export Collapse

Which of the following is the MOST important objective when planning an incident response program?

Become a Premium Member for full access
  Unlock Premium Member

Question 685

Report Export Collapse

The use of a business case to obtain funding for an information security investment is MOST effective when the business case:

Become a Premium Member for full access
  Unlock Premium Member

Question 686

Report Export Collapse

Which of the following presents the GREATEST challenge to a large multinational organization using an automated identity and access management (1AM) system?

Become a Premium Member for full access
  Unlock Premium Member

Question 687

Report Export Collapse

When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?

Become a Premium Member for full access
  Unlock Premium Member

Question 688

Report Export Collapse

Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?

Become a Premium Member for full access
  Unlock Premium Member

Question 689

Report Export Collapse

A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?

Become a Premium Member for full access
  Unlock Premium Member

Question 690

Report Export Collapse

A new information security manager finds that the organization tends to use short-term solutions to address problems. Resource allocation and spending are not effectively tracked, and there is no assurance that compliance requirements are being met. What should be done FIRST to reverse this bottom-up approach to security?

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81
Search