Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 1 out of 15 pages
Viewing questions 1-20 out of questions
Questions # 1:

An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?

Options:

A.

Assess business impact against security risk.


B.

Provide security awareness training to customers.


C.

Refer to industry best practices.


D.

Quantify the security risk to the business.


Expert Solution
Questions # 2:

What is the MOST important consideration for an organization operating in a highly regulated market when new regulatory requirements with high impact to the business need to be implemented?

Options:

A.

Engaging an external audit


B.

Establishing compensating controls


C.

Enforcing strong monitoring controls


D.

Conducting a gap analysis


Expert Solution
Questions # 3:

Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?

Options:

A.

Record and close security incident tickets.


B.

Test and verify that compromisedsystems are clean.


C.

Document recovery steps for senior management reporting.


D.

Capture and preserve forensic images of affected systems.


Expert Solution
Questions # 4:

After a server has been attacked, which of the following is the BEST course of action?

Options:

A.

Initiate incident response.


B.

Review vulnerability assessment.


C.

Conduct a security audit.


D.

Isolate the system.


Expert Solution
Questions # 5:

Which of the following is MOST important when responding to a major security incident?

Options:

A.

Contacting forensic investigators


B.

Following the escalation process


C.

Notifying law enforcement


D.

Identifying the indicators of compromise


Expert Solution
Questions # 6:

Which of the following should an information security manager do FIRST upon learning that a competitor has experienced a ransomware attack?

Options:

A.

Perform a full data backup.


B.

Conduct ransomware awareness training for all staff.


C.

Update indicators of compromise in the security systems.


D.

Review the current risk assessment.


Expert Solution
Questions # 7:

Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?

Options:

A.

The risks are entered in the organization's risk register.


B.

The risks are reported to the business unit's senior management.


C.

The risks are escalated to the IT department for remediation.


D.

The risks are communicated to the central risk function.


Expert Solution
Questions # 8:

Which of the following is ESSENTIAL to ensuring effective incident response?

Options:

A.

Business continuity plan (BCP)


B.

Cost-benefit analysis


C.

Classification scheme


D.

Senior management support


Expert Solution
Questions # 9:

An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?

Options:

A.

Local regulations


B.

Data backup strategy


C.

Consistency in awareness programs


D.

Organizational reporting structure


Expert Solution
Questions # 10:

An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?

Options:

A.

Enforce the policy.


B.

Modify the policy.


C.

Present the risk to senior management.


D.

Create an exception for the deviation.


Expert Solution
Questions # 11:

Which of the following is established during the preparation phase of an incident response plan?

Options:

A.

Recovery time objectives (RTOs)


B.

Chain of custody procedures


C.

Stakeholder communication plan


D.

Mean time to respond (MTTR)


Expert Solution
Questions # 12:

What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?

Options:

A.

Report the noncompliance to senior management.


B.

Assess the risk of noncompliance.


C.

Activate the incident response plan.


D.

Evaluate possible compensating controls.


Expert Solution
Questions # 13:

The PRIMARY consideration when responding to a ransomware attack should be to ensure:

Options:

A.

backups are available.


B.

the most recent patches have been applied.


C.

the ransomware attack is contained


D.

the business can operate


Expert Solution
Questions # 14:

An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?

Options:

A.

Operations manager


B.

Service owner


C.

Information security manager


D.

Incident response team


Expert Solution
Questions # 15:

The PRIMARY goal to a post-incident review should be to:

Options:

A.

identify policy changes to prevent a recurrence.


B.

determine how to improve the incident handling process.


C.

establish the cost of the incident to the business.


D.

determine why the incident occurred.


Expert Solution
Questions # 16:

The PRIMARY purpose of implementing information security governance metrics is to:

Options:

A.

measure alignment with best practices.


B.

assess operational and program metrics.


C.

guide security towards the desired state.


D.

refine control operations.


Expert Solution
Questions # 17:

Which of the following BEST indicates the effectiveness of the vendor risk management process?

Options:

A.

Increase in the percentage of vendors certified to a globally recognized security standard


B.

Increase in the percentage of vendors with a completed due diligence review


C.

Increase in the percentage of vendors conducting mandatory security training


D.

Increase in the percentage of vendors that have reported security breaches


Expert Solution
Questions # 18:

An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?

Options:

A.

Risk levels may be elevated beyond acceptable limits.


B.

Security audits may report more high-risk findings.


C.

The compensating controls may not be cost efficient.


D.

Noncompliance with industry best practices may result.


Expert Solution
Questions # 19:

The MAIN benefit of implementing a data loss prevention (DLP) solution is to:

Options:

A.

enhance the organization's antivirus controls.


B.

eliminate the risk of data loss.


C.

complement the organization's detective controls.


D.

reduce the need for a security awareness program.


Expert Solution
Questions # 20:

An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?

Options:

A.

No owners were identified for some risks.


B.

Business applications had the highest number of risks.


C.

Risk mitigation action plans had no timelines.


D.

Risk mitigation action plan milestones were delayed.


Expert Solution
Viewing page 1 out of 15 pages
Viewing questions 1-20 out of questions