Isaca CISM Practice Test - Questions Answers, Page 70
List of questions
Related questions
Of the following, who is BEST suited to own the risk discovered in an application?
A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
When building support for an information security program, which of the following elements is MOST important?
A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?
Which of the following is the BEST indicator of an emerging incident?
Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?
Data classification is PRIMARILY the responsibility of:
Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?
To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?
Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?
Question