Isaca CISM - Certified Information Security Manager
Which of the following is the BEST indication of information security strategy alignment with the “&
The PRIMARY objective of performing a post-incident review is to:
Which of the following is the MOST essential element of an information security program?
Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
Which of the following should be the PRIMARY goal of information security?
Which of the following is the MOST effective way to increase security awareness in an organization?
How would the information security program BEST support the adoption of emerging technologies?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
Which of the following tasks should be performed once a disaster recovery plan (DRP) has been developed?
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
Which of the following has the MOST influence on the inherent risk of an information asset?
Which of the following tools would be MOST helpful to an incident response team?
Which of the following is the MOST important consideration when briefing executives about the current state of the information security program?
Which of the following would be MOST useful when determining the business continuity strategy for a large organization's data center?
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:
Which of the following is the GREATEST benefit of using AI tools in security operations?