Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 1 out of 16 pages
Viewing questions 1-20 out of questions
Questions # 1:

When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?

Options:

A.

External consultant


B.

Information owners


C.

Information security manager


D.

Business continuity coordinator


Expert Solution
Questions # 2:

Conducting log analysis falls into which phase of the incident management life cycle?

Options:

A.

Post-incident


B.

Containment


C.

Detection


D.

Planning


Expert Solution
Questions # 3:

Which type of policy BEST helps to ensure that all employees, contractors, and third-party users receive formal communication regarding an organization’s security program?

Options:

A.

Management review policy


B.

Business continuity management policy


C.

Information security training policy


D.

Security incident management policy


Expert Solution
Questions # 4:

A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?

Options:

A.

Security manager


B.

Chief information security officer (CISO)


C.

System administrator


D.

Business owner


Expert Solution
Questions # 5:

An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:

Options:

A.

a control self-assessment (CSA) process.


B.

automated reporting to stakeholders.


C.

a monitoring process for the security policy.


D.

metrics for each milestone.


Expert Solution
Questions # 6:

Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?

Options:

A.

To prioritize security initiatives


B.

To avoid redundant controls


C.

To align with emerging risk


D.

To address end-user control complaints


Expert Solution
Questions # 7:

Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?

Options:

A.

Risk heat map.


B.

Security benchmark report.


C.

Security metrics dashboard.


D.

Key risk indicators (KRIs).


Expert Solution
Questions # 8:

An organization that conducts business globally is planning to utilize a third-party service provider to process payroll information. Which of the following issues poses the GREATEST risk to the organization?

Options:

A.

The third party does not have an independent assessment of controls available for review.


B.

The third party has not provided evidence of compliance with local regulations where data is generated.


C.

The third-party contract does not include an indemnity clause for compensation in the event of a breach.


D.

The third party's service level agreement (SLA) does not include guarantees of uptime.


Expert Solution
Questions # 9:

Which of the following is the BEST way to build a risk-aware culture?

Options:

A.

Periodically change risk awareness messages.


B.

Ensure that threats are documented and communicated in a timely manner.


C.

Establish a channel for staff to report risks.


D.

Periodically test compliance with security controls.


Expert Solution
Questions # 10:

The MOST important element in achieving executive commitment to an information security governance program is:

Options:

A.

a defined security framework.


B.

a process improvement model


C.

established security strategies.


D.

identified business drivers.


Expert Solution
Questions # 11:

Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?

Options:

A.

Evaluate the results of business continuity testing.


B.

Review key performance indicators (KPIs).


C.

Evaluate the business impact of incidents.


D.

Engage business process owners.


Expert Solution
Questions # 12:

An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?

Options:

A.

Preventive


B.

Corrective


C.

Detective


D.

Deterrent


Expert Solution
Questions # 13:

An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:

Options:

A.

the chief risk officer (CRO).


B.

business senior management.


C.

the information security manager.


D.

the compliance officer.


Expert Solution
Questions # 14:

Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?

Options:

A.

Communicate disciplinary processes for policy violations.


B.

Require staff to participate in information security awareness training.


C.

Require staff to sign confidentiality agreements.


D.

Include information security responsibilities in job descriptions.


Expert Solution
Questions # 15:

Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?

Options:

A.

Statistical reports will be incorrect.


B.

The service desk will be staffed incorrectly.


C.

Escalation procedures will be ineffective.


D.

Timely detection of attacks will be impossible.


Expert Solution
Questions # 16:

An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:

• A bad actor broke into a business-critical FTP server by brute forcing an administrative password

• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored

• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server

• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail

Which of the following could have been prevented by conducting regular incident response testing?

Options:

A.

Ignored alert messages


B.

The server being compromised


C.

The brute force attack


D.

Stolen data


Expert Solution
Questions # 17:

Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?

Options:

A.

Assess changes in the risk profile.


B.

Activate the disaster recovery plan (DRP).


C.

Invoke the incident response plan.


D.

Conduct security awareness training.


Expert Solution
Questions # 18:

An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?

Options:

A.

Responsible entities


B.

Key risk indicators (KRIS)


C.

Compensating controls


D.

Potential business impact


Expert Solution
Questions # 19:

Which of the following is MOST important to ensure the alignment of an information security program with the organizational strategy?

Options:

A.

Benchmarking against industry peers


B.

Adoption of an industry recognized framework


C.

Approval from senior management


D.

Identification of business-specific risk factors


Expert Solution
Questions # 20:

Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?

Options:

A.

Threat analytics software


B.

Host intrusion detection system


C.

SIEM


D.

Network intrusion detection system


Expert Solution
Viewing page 1 out of 16 pages
Viewing questions 1-20 out of questions