Isaca CISM - Certified Information Security Manager
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
An organization wants to migrate a proprietary application to be hosted by a third-party cloud hosting provider using a Platform as a Service (PaaS) model. Prior to selecting the cloud provider, what is MOST important for the organization to ensure?
Which of the following is an example of risk mitigation?
Which of the following is the MOST important function of an information security steering committee?
An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Which of the following BEST helps to enable the desired information security culture within an organization?
Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?
Which of the following BEST enables staff acceptance of information security policies?
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
Which of the following is the BEST indication of an effective disaster recovery planning process?
A balanced scorecard MOST effectively enables information security:
The PRIMARY objective of performing a post-incident review is to:
During which phase of an incident response plan is the root cause determined?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
Which of the following is the BEST control to protect customer personal information that is stored in the cloud?
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
Which of the following parties should be responsible for determining access levels to an application that processes client information?
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?