Free Certification Practice Questions

ISACA-CISM

Loading…
Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?
#151
Which of the following is MOST important when developing an information security governance framework?
#152
What should be an information security manager's GREATEST concern when an HR department outsources data processing to a cloud service provider?
#153
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
#154
Which of the following BEST determines an information asset's classification?
#155
When an organization implements an information security governance framework, it is MOST important for executive leadership to have a direct role in:
#156
Which of the following should have the MOST influence on an organization's response to a new industry regulation?
#157
Biometrics are BEST used for:
#158
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
#159
Communicating which of the following would be MOST helpful to gain senior management support for risk treatment options?
#160
Which of the following is the BEST defense against distributed denial of service (DDoS) attacks?
#161
Which of the following scenarios would MOST likely require a change to corporate security policies?
#162
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
#163
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?
#164
Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?
#165
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
#166
Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
#167
Which of the following would be MOST useful when determining the business continuity strategy for a large organization's data center?
#168
The results of a risk assessment for a potential network reconfiguration reveal a high likelihood of sensitive data being compromised. What is the information security manager's BEST course of action?
#169
Who should be included in INITIAL discussions regarding a failed security control?
#170
Which of the following is the MOST important outcome of a post-incident review?
#171
Which of the following is the BEST indicator of the performance of a security program?
#172
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
#173
Which of the following BEST facilitates the development of a comprehensive information security policy?
#174
Which of the following is the MOST effective way to demonstrate improvement in security performance?
#175
Capacity planning would prevent:
#176
Which of the following is the MOST effective way to ensure information security policies are understood?
#177
Which of the following is the MOST effective method for testing an incident response plan?
#178
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
#179
Which of the following is the MOST important reason for an organization to develop an information security governance program?
#180