Isaca CISM - Certified Information Security Manager
Which of the following BEST facilitates effective incident response testing?
A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
Which of the following BEST supports information security management in the event of organizational changes in security personnel?
Which of the following should be the PRIMARY basis for a severity hierarchy for information security incident classification?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
Which of the following is the MOST important input to the development of an effective information security strategy?
Which of the following is the BEST method to ensure compliance with password standards?
An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.
Which of the following should be given immediate focus?
Which of the following should be the PRIMARY objective when establishing a new information security program?
A recovery point objective (RPO) is required in which of the following?
Which of the following is the MOST important reason for logging firewall activity?
The categorization of incidents is MOST important for evaluating which of the following?
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
Which of the following BEST illustrates residual risk within an organization?
Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?
Which of the following is the FIRST step in developing a business continuity plan (BCP)?
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?
A technical vulnerability assessment on a personnel information management server should be performed when:
A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is