Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Isaca Certification CISM Book

Page: 16 / 70
Total 954 questions

Certified Information Security Manager Questions and Answers

Question 61

A security incident has been reported within an organization. When should an information security manager contact the information owner?

Options:

A.

After the incident has been contained

B.

After the incident has been mitigated

C.

After the incident has been confirmed

D.

After the potential incident has been logged

Question 62

Which of the following would MOST effectively ensure that a new server is appropriately secured?

Options:

A.

Performing secure code reviews

B.

Enforcing technical security standards

C.

Conducting penetration testing

D.

Initiating security scanning

Question 63

Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?

Options:

A.

Senior management

B.

Information owner

C.

Business manager

D.

Information security manager

Question 64

Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?

Options:

A.

IT system clocks are not synchronized with the centralized logging server.

B.

Operating systems are no longer supported by the vendor.

C.

The patch management system does not deploy patches in a timely manner.

D.

An organization has a decentralized data center that uses cloud services.

Page: 16 / 70
Total 954 questions