ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 75

Add to Whishlist

List of questions

Question 741

Report Export Collapse

Which of the following should be the PRIMARY goal of information security?

Become a Premium Member for full access
  Unlock Premium Member

Question 742

Report Export Collapse

An experienced information security manager joins a new organization and begins by conducting an audit of all key IT processes. Which of the following findings about the vulnerability management program should be of GREATEST concern?

Become a Premium Member for full access
  Unlock Premium Member

Question 743

Report Export Collapse

A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:

Become a Premium Member for full access
  Unlock Premium Member

Question 744

Report Export Collapse

Which of the following is a PRIMARY function of an incident response team?

Become a Premium Member for full access
  Unlock Premium Member

Question 745

Report Export Collapse

The PRIMARY goal of a post-incident review should be to:

Become a Premium Member for full access
  Unlock Premium Member

Question 746

Report Export Collapse

Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?

Become a Premium Member for full access
  Unlock Premium Member

Question 747

Report Export Collapse

When remote access is granted to a company's internal network, the MOST important consideration should be that access is provided:

Become a Premium Member for full access
  Unlock Premium Member

Question 748

Report Export Collapse

Which of the following is MOST important to the effectiveness of an information security steering committee?

Become a Premium Member for full access
  Unlock Premium Member

Question 749

Report Export Collapse

The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:

Become a Premium Member for full access
  Unlock Premium Member

Question 750

Report Export Collapse

After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81