Isaca CISM - Certified Information Security Manager
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
Which of the following is the BEST reason to implement a comprehensive information security management system?
To ensure continuous alignment with the organizational strategy
To gain senior management support for the information security program
To support identification of key risk indicators (KRIs)
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?
Which of the following BEST enables an organization to effectively manage emerging cyber risk?
Senior management wants to thoroughly test a disaster recovery plan (DRP) for a mission-critical system. Which of the following would provide the MOST reliable results?
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
An information security manager is alerted to multiple security incidents across different business units, with unauthorized access to sensitive data and potential data exfiltration from critical systems. Which of the following is the BEST course of action to appropriately classify and prioritize these incidents?
The PRIMARY advantage of single sign-on (SSO) is that it will:
Which of the following is the PRIMARY benefit of training service desk staff to recognize incidents?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
An information security manager has been asked to provide both one-year and five-year plans for the information security program. What is the PRIMARY purpose for the long-term plan?
A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?
An organization has decided to implement an Internet of Things (IoT) solution to remain competitive in the market. Which of the following should information security do FIRST?
The effectiveness of an information security governance framework will BEST be enhanced if:
When remote access is granted to a company's internal network, the MOST important consideration should be that access is provided:
An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?
Which of the following is the GREATEST challenge when developing key risk indicators (KRIs)?
Which of the following metrics would provide an accurate measure of an information security program's performance?
Which of the following should be an information security manager s MOST important consideration when determining the priority for implementing security controls?