Isaca CISM Practice Test - Questions Answers, Page 76
List of questions
Related questions
Which of the following is the BEST defense against a brute force attack?
Which of the following should be the NEXT step after a security incident has been reported?
Which of the following is the BEST source of information to support an organization's information security vision and strategy?
Which of the following is MOST important to ensuring that incident management plans are executed effectively?
Which of the following is the PRIMARY reason to conduct a post-incident review?
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?
Question