Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Full Access Isaca CISM Tutorials

Page: 20 / 73
Total 967 questions

Certified Information Security Manager Questions and Answers

Question 77

Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?

Options:

A.

Develop a personal device policy

B.

Implement a mobile device management (MDM) solution

C.

Develop training specific to BYOD awareness

D.

Define control requirements

Question 78

Which of the following would BEST guide the development and maintenance of an information security program?

Options:

A.

A business impact assessment

B.

A comprehensive risk register

C.

An established risk assessment process

D.

The organization's risk appetite

Question 79

To help ensure that an information security training program is MOST effective its contents should be

Options:

A.

focused on information security policy.

B.

aligned to business processes

C.

based on employees' roles

D.

based on recent incidents

Question 80

Which of the following BEST enables the integration of information security governance into corporate governance?

Options:

A.

Well-decumented information security policies and standards

B.

An information security steering committee with business representation

C.

Clear lines of authority across the organization

D.

Senior management approval of the information security strategy

Page: 20 / 73
Total 967 questions