Free ISACA CISM Exam Braindumps (page: 47)

When an organization and its IT-hosting service provider are establishing a contract with each other, it is
MOST important that the contract includes:

  1. details of expected security metrics.
  2. each party’s security responsibilities.
  3. penalties for noncompliance with security policy.
  4. recovery time objectives (RTOs).

Answer(s): B

Explanation:

It's very important when organization start work with third party before signing the SLA negotiate the company current security needs and new security risk.



Which of the following would be MOST useful to help senior management understand the status of information security compliance?

  1. Industry benchmarks
  2. Risk assessment results
  3. Business impact analysis (BIA) results
  4. Key performance indicators (KPIs)

Answer(s): D



Which of the following is MOST likely to be included in an enterprise information security policy?

  1. Security monitoring strategy
  2. Audit trail review requirements
  3. Password composition requirements
  4. Consequences of noncompliance

Answer(s): D



Which of the following BEST demonstrates that an organization supports information security governance?

  1. Employees attend annual organization-wide security training.
  2. Information security policies are readily available to employees.
  3. The incident response plan is documented and tested regularly.
  4. Information security steering committee meetings are held regularly.

Answer(s): D



Viewing page 47 of 430
Viewing questions 185 - 188 out of 1716 questions



Post your Comments and Discuss ISACA CISM exam prep with other Community members:

CISM Exam Discussions & Posts