Isaca CISM Practice Test - Questions Answers, Page 76
List of questions
Question 751
Which of the following is the BEST defense against a brute force attack?
Question 752
Which of the following should be the NEXT step after a security incident has been reported?
Question 753
Which of the following is the BEST source of information to support an organization's information security vision and strategy?
Question 754
Which of the following is MOST important to ensuring that incident management plans are executed effectively?
Question 755
Which of the following is the PRIMARY reason to conduct a post-incident review?
Question 756
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
Question 757
Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
Question 758
Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
Question 759
An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
Question 760
When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?
Question