CISM 無料問題集「ISACA Certified Information Security Manager」

An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:

解説: (JPNTest メンバーにのみ表示されます)
Of the following, who is accountable for data loss in the event of an information security incident at a third- party provider?

解説: (JPNTest メンバーにのみ表示されます)
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?

解説: (JPNTest メンバーにのみ表示されます)
A security incident has been reported within an organization. When should an information security manager contact the information owner?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following defines the triggers within a business continuity plan (BCP)? @

解説: (JPNTest メンバーにのみ表示されます)
The MOST appropriate time to conduct a disaster recovery test would be after:

解説: (JPNTest メンバーにのみ表示されます)
Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?

解説: (JPNTest メンバーにのみ表示されます)
An organization learns that a third party has outsourced critical functions to another external provider. Which of the following is the information security manager's MOST important course of action?

解説: (JPNTest メンバーにのみ表示されます)
The PRIMARY purpose for conducting cybersecurity risk assessments is to:

解説: (JPNTest メンバーにのみ表示されます)
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:

解説: (JPNTest メンバーにのみ表示されます)
Which of the following is the MOST important reason for logging firewall activity?

Which type of control is an incident response team?

Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?

解説: (JPNTest メンバーにのみ表示されます)
The department head of application development has decided to accept the risks identified in a recent assessment. No recommendations will be implemented, even though the recommendations are required by regulatory oversight. What should the information security manager do NEXT?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following would provide the MOST effective security outcome in an organizations contract management process?

解説: (JPNTest メンバーにのみ表示されます)
Senior management has expressed concern that the organization's intrusion prevention system (IPS) may repeatedly disrupt business operations Which of the following BEST indicates that the information security manager has tuned the system to address this concern?

解説: (JPNTest メンバーにのみ表示されます)

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡