CISM試験無料問題集「ISACA Certified Information Security Manager 認定」

Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?

Which of the following should be the PRIMARY outcome of an information security program?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is MOST important for the effective implementation of an information security governance program?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?

解説: (GoShiken メンバーにのみ表示されます)
An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?

解説: (GoShiken メンバーにのみ表示されます)
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following BEST supports effective communication during information security incidents7

解説: (GoShiken メンバーにのみ表示されます)
Which of the following should be the PRIMARY basis for an information security strategy?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is the MOST effective way to increase security awareness in an organization?

Which of the following BEST supports information security management in the event of organizational changes in security personnel?

解説: (GoShiken メンバーにのみ表示されます)
What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?

解説: (GoShiken メンバーにのみ表示されます)
When drafting the corporate privacy statement for a public website, which of the following MUST be included?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following BEST enables an organization to effectively manage emerging cyber risk?

解説: (GoShiken メンバーにのみ表示されます)
An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?

解説: (GoShiken メンバーにのみ表示されます)
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following BEST indicates misalignment of security policies with business objectives?

Which or the following is MOST important to consider when determining backup frequency?

Which of the following is MOST important to include in an information security policy?