ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers, Page 79

Add to Whishlist

List of questions

Question 781

Report Export Collapse

Which of the following is MOST important for an information security manager to consider when determining whether data should be stored?

Become a Premium Member for full access
  Unlock Premium Member

Question 782

Report Export Collapse

Which of the following is the MOST important characteristic of an effective information security metric?

Become a Premium Member for full access
  Unlock Premium Member

Question 783

Report Export Collapse

Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?

Become a Premium Member for full access
  Unlock Premium Member

Question 784

Report Export Collapse

Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?

Become a Premium Member for full access
  Unlock Premium Member

Question 785

Report Export Collapse

Which of the following metrics would provide an accurate measure of an information security program's performance?

Become a Premium Member for full access
  Unlock Premium Member

Question 786

Report Export Collapse

Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?

Become a Premium Member for full access
  Unlock Premium Member

Question 787

Report Export Collapse

For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?

Become a Premium Member for full access
  Unlock Premium Member

Question 788

Report Export Collapse

Which of the following provides the BEST input to determine the level of protection needed for an IT system?

Become a Premium Member for full access
  Unlock Premium Member

Question 789

Report Export Collapse

Identifying which of the following BEST enables a cyberattack to be contained?

Become a Premium Member for full access
  Unlock Premium Member

Question 790

Report Export Collapse

Which of the following should be done FIRST when a SIEM flags a potential event?

Become a Premium Member for full access
  Unlock Premium Member
Total 801 questions
Go to page: of 81