Isaca CISM - Certified Information Security Manager
Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?
An organization's research department plans to apply machine learning algorithms on a large data set containing customer names and purchase history. The risk of personal data leakage is considered high impact. Which of the following is the BEST risk treatment option in this situation?
Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?
Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?
Prior to implementing a bring your own device (BYOD) program, it is MOST important to:
From a business perspective, the GREATEST benefit of an incident response plan is that it:
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
Which of the following would be MOST helpful when creating information security policies?
An organization would like to invest in a new emerging technology. Which of the following is MOST important for the information security manager to consider when evaluating its impact?
An online bank identifies a successful network attack in progress. The bank should FIRST:
Which of the following is the MOST effective way to ensure information security policies are understood?
An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?
For an e-business that requires high availability, which of the following design principles is BEST?
Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?
Which of the following is the PRIMARY benefit of an information security awareness training program?
An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?
Which of the following has the GREATEST influence on an organization's information security strategy?
The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include: