Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Isaca Isaca Certification CISM New Questions

Page: 47 / 70
Total 954 questions

Certified Information Security Manager Questions and Answers

Question 185

Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?

Options:

A.

Lack of encryption for backup data in transit

B.

Undefined or undocumented backup retention policies

C.

Ineffective alert configurations for backup operations

D.

Unavailable or corrupt data backups

Question 186

Which of the following BEST facilitates the development of a comprehensive information security policy?

Options:

A.

Alignment with an established information security framework

B.

An established internal audit program

C.

Security key performance indicators (KPIs)

D.

Areview of recent information security incidents

Question 187

Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?

Options:

A.

To improve awareness of information security

B.

To disclose the root cause of the incident

C.

To increase goodwill toward the organization

D.

To comply with regulations regarding notification

Question 188

When analyzing the emerging risk and threat landscape, an information security manager should FIRST:

Options:

A.

determine the impact if threats materialize.

B.

determine the sources of emerging threats.

C.

review historical threats within the industry.

D.

map threats to business assets.

Page: 47 / 70
Total 954 questions