Isaca CISM - Certified Information Security Manager
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
An organization's HR department requires that employee account privileges be removed from all corporate IT systems within three days of termination to comply with a government regulation However, the systems all have different user directories, and it currently takes up to four weeks to remove the privileges Which of the following would BEST enable regulatory compliance?
A finance department director has decided to outsource the organization's budget application and has identified potential providers. Which of the following actions should be initiated FIRST by IN information security manager?
Which of the following defines the triggers within a business continuity plan (BCP)? @
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
Which of the following is the PRIMARY purpose of an acceptable use policy?
Which of the following is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?
Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
Network isolation techniques are immediately implemented after a security breach to:
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
Which of the following should have the MOST influence on the development of information security policies?
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
Management decisions concerning information security investments will be MOST effective when they are based on:
An organization is in the process of defining policies for employee use of social media. It is MOST important for the information security manager to:
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
Which of the following is MOST important to determine following the discovery and eradication of a malware attack?
Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?
Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?