Isaca CISM - Certified Information Security Manager
A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
Which of the following BEST facilitates the development of a comprehensive information security policy?
Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?
Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?
Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?
Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
Of the following, who is BEST suited to own the risk discovered in an application?
A financial company executive is concerned about recently increasing cyberattacks and needs to take action to reduce risk. The organization would BEST respond by:
To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?
Information security policies should PRIMARILY reflect alignment with:
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
Who should be responsible for determining the level of data classification required for an application related to a new line of business?
Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?