ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 72

Add to Whishlist

List of questions

Question 711

Report Export Collapse

Which of the following should an information security manager do FIRST upon learning that a competitor has experienced a ransomware attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 712

Report Export Collapse

Which of the following metrics would BEST demonstrate the success of a newly implemented information security framework?

Become a Premium Member for full access
  Unlock Premium Member

Question 713

Report Export Collapse

An organization has suffered from a large-scale security event impacting a critical system. Following the decision to restore the system at an alternate location, which plan should be invoked?

Become a Premium Member for full access
  Unlock Premium Member

Question 714

Report Export Collapse

Which of the following is the MOST important role of the information security manager when the organization is in the process of adopting emerging technologies?

Become a Premium Member for full access
  Unlock Premium Member

Question 715

Report Export Collapse

An organization has updated its business goals in the middle of the fiscal year to respond to changes in market conditions. Which of the following is MOST important for the information security manager to update in support of the new goals?

Become a Premium Member for full access
  Unlock Premium Member

Question 716

Report Export Collapse

An organization's research department plans to apply machine learning algorithms on a large data set containing customer names and purchase history. The risk of personal data leakage is considered high impact. Which of the following is the BEST risk treatment option in this situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 717

Report Export Collapse

The PRIMARY purpose of implementing information security governance metrics is to:

Become a Premium Member for full access
  Unlock Premium Member

Question 718

Report Export Collapse

Which of the following is the MOST effective way to detect information security incidents?

Become a Premium Member for full access
  Unlock Premium Member

Question 719

Report Export Collapse

Which of the following is MOST important to include in an information security policy?

Become a Premium Member for full access
  Unlock Premium Member

Question 720

Report Export Collapse

When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81
Search