Isaca CISM Practice Test - Questions Answers, Page 75
List of questions
Question 741
Which of the following should be the PRIMARY goal of information security?
Question 742
An experienced information security manager joins a new organization and begins by conducting an audit of all key IT processes. Which of the following findings about the vulnerability management program should be of GREATEST concern?
Question 743
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
Question 744
Which of the following is a PRIMARY function of an incident response team?
Question 745
The PRIMARY goal of a post-incident review should be to:
Question 746
Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?
Question 747
When remote access is granted to a company's internal network, the MOST important consideration should be that access is provided:
Question 748
Which of the following is MOST important to the effectiveness of an information security steering committee?
Question 749
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
Question 750
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
Question