Isaca CISM - Certified Information Security Manager
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
Which of the following is the MOST important consideration when defining control objectives?
Which of the following should be done FIRST after a ransomware incident has been successfully contained?
Which of the following is the PRIMARY responsibility of the information security function when an organization adopts emerging technologies?
Which of the following should an information security manager do FIRST after a new cybersecunty regulation has been introduced?
Which of the following is MOST important for guiding the development and management of a comprehensive information security program?
Which of the following will BEST facilitate the integration of information security governance into enterprise governance?
A risk owner has accepted a large amount of risk due to the high cost of controls. Which of the following should be the information security manager's PRIMARY focus in this situation?
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
Which of the following is the MOST important outcome of a post-incident review?
Which of the following should be done FIRST when implementing a security program?
Which of the following should be done FIRST when a SIEM flags a potential event?
The PRIMARY goal of the eradication phase in an incident response process is to:
After logging in to a web application, additional authentication is checked at various application points. Which of the following is the PRIMARY reason for such an approach?
An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?
The PRIMARY purpose of vulnerability identification is to:
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?
Which of the following is MOST important in increasing the effectiveness of incident responders?
Which of the following is MOST important when designing an information security governance framework?