Isaca CISM - Certified Information Security Manager
Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?
An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:
Which of the following is the MOST effective way to ensure the security of services and solutions delivered by third-party vendors?
Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?
Which of the following is the MOST appropriate risk response when the risk impact has been determined to be immaterial and the likelihood is very low?
How does an incident response team BEST leverage the results of a business impact analysis (BIA)?
Which of the following would BEST support the business case for an increase in the information security budget?
What is the MOST important consideration for an organization operating in a highly regulated market when new regulatory requirements with high impact to the business need to be implemented?
Which of the following is the MOST effective way to influence organizational culture to align with security guidelines?
Which of the following provides the MOST comprehensive understanding of an organization's information security posture?
An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?
An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
Which of the following activities MUST be performed by an information security manager for change requests?
Which of the following should be the NEXT step after a security incident has been reported?
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?
Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?
Which of the following is the GREATEST benefit of information asset classification?
Reverse lookups can be used to prevent successful: