Isaca CISM Practice Test - Questions Answers, Page 70

List of questions
Question 691

Of the following, who is BEST suited to own the risk discovered in an application?
Question 692

A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
Question 693

When building support for an information security program, which of the following elements is MOST important?
Question 694

A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?
Question 695

Which of the following is the BEST indicator of an emerging incident?
Question 696

Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?
Question 697

Data classification is PRIMARILY the responsibility of:
Question 698

Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?
Question 699

To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?
Question 700

Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?
Question