Isaca CISM Practice Test - Questions Answers, Page 72
List of questions
Related questions
Which of the following should an information security manager do FIRST upon learning that a competitor has experienced a ransomware attack?
Which of the following metrics would BEST demonstrate the success of a newly implemented information security framework?
An organization has suffered from a large-scale security event impacting a critical system. Following the decision to restore the system at an alternate location, which plan should be invoked?
Which of the following is the MOST important role of the information security manager when the organization is in the process of adopting emerging technologies?
An organization has updated its business goals in the middle of the fiscal year to respond to changes in market conditions. Which of the following is MOST important for the information security manager to update in support of the new goals?
An organization's research department plans to apply machine learning algorithms on a large data set containing customer names and purchase history. The risk of personal data leakage is considered high impact. Which of the following is the BEST risk treatment option in this situation?
The PRIMARY purpose of implementing information security governance metrics is to:
Which of the following is the MOST effective way to detect information security incidents?
Which of the following is MOST important to include in an information security policy?
When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:
Question