Isaca CISM Practice Test - Questions Answers, Page 79
List of questions
Related questions
Which of the following is MOST important for an information security manager to consider when determining whether data should be stored?
Which of the following is the MOST important characteristic of an effective information security metric?
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?
Which of the following metrics would provide an accurate measure of an information security program's performance?
Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
Which of the following provides the BEST input to determine the level of protection needed for an IT system?
Identifying which of the following BEST enables a cyberattack to be contained?
Which of the following should be done FIRST when a SIEM flags a potential event?
Question