ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 70

Add to Whishlist

List of questions

Question 691

Report Export Collapse

Of the following, who is BEST suited to own the risk discovered in an application?

Become a Premium Member for full access
  Unlock Premium Member

Question 692

Report Export Collapse

A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 693

Report Export Collapse

When building support for an information security program, which of the following elements is MOST important?

Become a Premium Member for full access
  Unlock Premium Member

Question 694

Report Export Collapse

A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?

Become a Premium Member for full access
  Unlock Premium Member

Question 695

Report Export Collapse

Which of the following is the BEST indicator of an emerging incident?

Become a Premium Member for full access
  Unlock Premium Member

Question 696

Report Export Collapse

Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?

Become a Premium Member for full access
  Unlock Premium Member

Question 697

Report Export Collapse

Data classification is PRIMARILY the responsibility of:

Become a Premium Member for full access
  Unlock Premium Member

Question 698

Report Export Collapse

Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 699

Report Export Collapse

To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?

Become a Premium Member for full access
  Unlock Premium Member

Question 700

Report Export Collapse

Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81