Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Isaca CISM Actual Questions

Page: 14 / 73
Total 967 questions

Certified Information Security Manager Questions and Answers

Question 53

Which of the following is the BEST indication of an effective information security program?

Options:

A.

Risk is treated to an acceptable level.

B.

The number of security incidents reported by staff has increased.

C.

Key risk indicators (KRIs) are established.

D.

Policies are reviewed and approved by senior management.

Question 54

An internal audit has revealed that a number of information assets have been inappropriately classified. To correct the classifications, the remediation accountability should be assigned to:

Options:

A.

the business users.

B.

the information owners.

C.

the system administrators.

D.

senior management.

Question 55

The PRIMARY objective of performing a post-incident review is to:

Options:

A.

re-evaluate the impact of incidents.

B.

identify vulnerabilities.

C.

identify control improvements.

D.

identify the root cause.

Question 56

When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?

Options:

A.

Digital currency is immediately available.

B.

Network access requires two-factor authentication.

C.

Data backups are recoverable from an offsite location.

D.

An alternative network link is immediately available.

Page: 14 / 73
Total 967 questions