Isaca CISM - Certified Information Security Manager
Who is accountable for approving an information security governance framework?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?
Which of the following BEST supports effective communication during information security incidents7
Which of the following is the PRIMARY reason to review the firewall logs when an external network-based attack is reported by the intrusion detection system (IDS)?
An anomaly-based intrusion detection system (IDS) operates by gathering data on:
Which of the following is the BEST way to address data availability concerns when outsourcing information security administration?
Which of the following should be the FIRST step in developing an information security strategy?
When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?
An internal audit has revealed that a number of information assets have been inappropriately classified. To correct the classifications, the remediation accountability should be assigned to:
To ensure that a new application complies with information security policy, the BEST approach is to:
Which of the following should be the FIRST step in developing an information security strategy?
Which of the following would BEST justify continued investment in an information security program?
Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
Which of the following is the MOST effective way to protect the authenticity of data in transit?
A security incident has been reported within an organization. When should an information security manager contact the information owner?
Which of the following BEST ensures information security governance is aligned with corporate governance?
Which of the following should be done FIRST to prioritize response to incidents?
What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?