Isaca CISM Practice Test - Questions Answers, Page 79
List of questions
Question 781
Which of the following is MOST important for an information security manager to consider when determining whether data should be stored?
Question 782
Which of the following is the MOST important characteristic of an effective information security metric?
Question 783
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
Question 784
Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?
Question 785
Which of the following metrics would provide an accurate measure of an information security program's performance?
Question 786
Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?
Question 787
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
Question 788
Which of the following provides the BEST input to determine the level of protection needed for an IT system?
Question 789
Identifying which of the following BEST enables a cyberattack to be contained?
Question 790
Which of the following should be done FIRST when a SIEM flags a potential event?
Question