Isaca CISM Practice Test - Questions Answers, Page 80

List of questions
Question 791

Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
Question 792

Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?
Question 793

Which of the following is the PRIMARY objective of information asset classification?
Question 794

Which type of backup BEST enables an organization to recover data after a ransomware attack?
Question 795

An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?
Question 796

Which of the following provides the MOST effective response against ransomware attacks?
Question 797

Which of the following would be MOST important to include in a proposal justifying investments for an organization's information security program?
Question 798

Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
Question 799

An incident response policy should include:
Question 800

Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?
Question