Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Isaca Certification CISM Passing Score

Page: 50 / 69
Total 920 questions

Certified Information Security Manager Questions and Answers

Question 197

Which of the following is MOST helpful to identify whether information security policies have been followed?

Options:

A.

Preventive controls

B.

Detective controls

C.

Directive controls

D.

Corrective controls

Question 198

Which of the following BEST determines the allocation of resources during a security incident response?

Options:

A.

Senior management commitment

B.

A business continuity plan (BCP)

C.

An established escalation process

D.

Defined levels of severity

Question 199

Which of the following components of an information security risk assessment is MOST valuable to senior management?

Options:

A.

Threat profile

B.

Residual risk

C.

Return on investment (ROI)

D.

Mitigation actions

Question 200

Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?

Options:

A.

Force password changes on the SQL database.

B.

Reconfigure the web application firewall to block the attack.

C.

Update the detection patterns on the web application firewall.

D.

Block the IPs from where the attack originates.

Page: 50 / 69
Total 920 questions