Isaca CISM Practice Test - Questions Answers, Page 80
List of questions
Question 791
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
Question 792
Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?
Question 793
Which of the following is the PRIMARY objective of information asset classification?
Question 794
Which type of backup BEST enables an organization to recover data after a ransomware attack?
Question 795
An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?
Question 796
Which of the following provides the MOST effective response against ransomware attacks?
Question 797
Which of the following would be MOST important to include in a proposal justifying investments for an organization's information security program?
Question 798
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
Question 799
An incident response policy should include:
Question 800
Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?
Question