Isaca CISM Practice Test - Questions Answers, Page 78
List of questions
Related questions
An information security manager has learned of an increasing trend in attacks that use phishing emails impersonating an organization's CEO in an attempt to commit wire transfer fraud. Which of the following is the BEST way to reduce the risk associated with this type of attack?
Which of the following is the BEST indication of an effective disaster recovery planning process?
Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
The PRIMARY reason to properly classify information assets is to determine:
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
When analyzing the emerging risk and threat landscape, an information security manager should FIRST:
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
Question