Isaca CISM Practice Test - Questions Answers, Page 76

List of questions
Question 751

Which of the following is the BEST defense against a brute force attack?
Question 752

Which of the following should be the NEXT step after a security incident has been reported?
Question 753

Which of the following is the BEST source of information to support an organization's information security vision and strategy?
Question 754

Which of the following is MOST important to ensuring that incident management plans are executed effectively?
Question 755

Which of the following is the PRIMARY reason to conduct a post-incident review?
Question 756

How does an organization PRIMARILY benefit from the creation of an information security steering committee?
Question 757

Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
Question 758

Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
Question 759

An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
Question 760

When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?
Question