Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Selected CISM Isaca Certification Questions Answers

Page: 10 / 73
Total 967 questions

Certified Information Security Manager Questions and Answers

Question 37

Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?

Options:

A.

Risk acceptance by the business has been documented

B.

Teams and individuals responsible for recovery have been identified

C.

Copies of recovery and incident response plans are kept offsite

D.

Incident response and recovery plans are documented in simple language

Question 38

Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?

Options:

A.

A patch management process

B.

Version control

C.

Change management controls

D.

Logical access controls

Question 39

Which of the following should be the FIRST consideration when developing a strategy for protecting an organization's data?

Options:

A.

Classification

B.

Encryption

C.

Access monitoring

D.

Access rights

Question 40

Which of the following BEST enables an information security manager to demonstrate the effectiveness of the information security and risk program to senior management?

Options:

A.

Updated risk assessments

B.

Counts of information security incidents

C.

Audit reports

D.

Monthly metrics

Page: 10 / 73
Total 967 questions