Isaca CISM Practice Test - Questions Answers, Page 79

List of questions
Question 781

Which of the following is MOST important for an information security manager to consider when determining whether data should be stored?
Question 782

Which of the following is the MOST important characteristic of an effective information security metric?
Question 783

Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
Question 784

Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?
Question 785

Which of the following metrics would provide an accurate measure of an information security program's performance?
Question 786

Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?
Question 787

For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
Question 788

Which of the following provides the BEST input to determine the level of protection needed for an IT system?
Question 789

Identifying which of the following BEST enables a cyberattack to be contained?
Question 790

Which of the following should be done FIRST when a SIEM flags a potential event?
Question