Isaca CISM - Certified Information Security Manager
Which risk is introduced when using only sanitized data for the testing of applications?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
An information security program is BEST positioned for success when it is closely aligned with:
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?
Which of the following is the MOST effective way to prevent information security incidents?
Which of the following would BEST ensure that security is integrated during application development?
An incident handler is preparing a forensic image of a hard drive. Which of the following MUST be done to provide evidence that the image is an exact copy of the original?
An organization has discovered that a server processing real-time visual data could be vulnerable to a lateral movement stage in a ransomware attack. Which of the following controls BEST mitigates this vulnerability?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
What should be an information security manager's MOST important consideration when developing a multi-year plan?
The PRIMARY benefit of integrating information security activities into change management processes is to:
An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:
Which of the following is the BEST way to evaluate the effectiveness of physical and environmental security controls implemented for fire-related disasters?
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?