Isaca
CISM
120 Minutes
801
Certified Information Security Manager
A: Risk is treated to an acceptable level.
B: The number of security incidents reported by staff has increased.
C: Key risk indicators (KRIs) are established.
D: Policies are reviewed and approved by senior management.
A: Temporarily suspend wire transfers for the organization.
B: Provide awareness training to the CEO for this type of phishing attack.
C: Provide awareness training to staff responsible for wire transfers.
D: Disable emails for staff responsible for wire transfers.
A: determine the impact if threats materialize.
B: determine the sources of emerging threats.
C: review historical threats within the industry.
D: map threats to business assets.
A: Hot sites are required for any declared disaster.
B: Chain of custody is maintained throughout the disaster recovery process.
C: Post-incident reviews are conducted after each event.
D: Recovery time objectives (RTOs) are shorter than recovery point objectives (RPOs).