Free Certification Practice Questions

ISACA-CISM

Loading…
Which of the following provides the MOST essential input for the development of an information security strategy?
#271
A business unit handles sensitive personally identifiable information (PII), which presents a significant financial liability to the organization should a breach occur. Which of the following is the BEST way to mitigate the risk to the organization?
#272
Which of the following would be impacted the MOST by a business decision to move from traditional computing to cloud computing?
#273
Key risk indicators (KRIs) are MOST effective when they:
#274
An organization's intrusion prevention system (IPS) detected and blocked an unusually large number of external intrusion attempts within a 24-hour period. Which of the following should be the information security manager's FIRST course of action?
#275
Which of the following is the BEST indication that an organization has integrated information security governance with corporate governance?
#276
The MOST effective way to present information security risk to senior management is to highlight:
#277
Which of the following should be the PRIMARY objective for creating a culture of security within an organization?
#278
Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?
#279
Which of the following is the MOST effective way to ensure the security of services and solutions delivered by third-party vendors?
#280
Which of the following BEST illustrates residual risk within an organization?
#281
Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?
#282
An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?
#283
Which of the following is the MOST important success factor when developing an information security strategy?
#284
Which of the following BEST demonstrates a security-conscious organizational culture?
#285
Which of the following is the BEST method to ensure compliance with password standards?
#286
The PRIMARY purpose for deploying information security metrics is to:
#287
Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?
#288
An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?
#289
Which of the following should an information security manager do FIRST when informed that customer data has been breached within a third-party vendor's environment?
#290
A recent audit found that an organization's new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?
#291
When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:
#292
Which of the following controls would BEST help to detect a targeted attack exploiting a zero-day vulnerability?
#293
Which of the following is the MOST relevant control to address the integrity of information?
#294
What should be the PRIMARY objective of an information classification scheme?
#295