Isaca CISM Practice Test - Questions Answers, Page 75
List of questions
Related questions
Which of the following should be the PRIMARY goal of information security?
An experienced information security manager joins a new organization and begins by conducting an audit of all key IT processes. Which of the following findings about the vulnerability management program should be of GREATEST concern?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
Which of the following is a PRIMARY function of an incident response team?
The PRIMARY goal of a post-incident review should be to:
Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?
When remote access is granted to a company's internal network, the MOST important consideration should be that access is provided:
Which of the following is MOST important to the effectiveness of an information security steering committee?
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
Question