Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 10 out of 15 pages
Viewing questions 181-200 out of questions
Questions # 181:

Which of the following is the PRIMARY benefit of an information security awareness training program?

Options:

A.

Influencing human behavior


B.

Evaluating organizational security culture


C.

Defining risk accountability


D.

Enforcing security policy


Expert Solution
Questions # 182:

Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?

Options:

A.

Demonstrating the program's value to the organization


B.

Discussing governance programs found in similar organizations


C.

Providing the results of external audits


D.

Providing examples of information security incidents within the organization


Expert Solution
Questions # 183:

Which of the following is the MOST important issue in a penetration test?

Options:

A.

Having an independent group perform the test


B.

Obtaining permission from audit


C.

Performing the test without the benefit of any insider knowledge


D.

Having a defined goal as well as success and failure criteria


Expert Solution
Questions # 184:

When investigating an information security incident, details of the incident should be shared:

Options:

A.

widely to demonstrate positive intent.


B.

only with management.


C.

only as needed,


D.

only with internal audit.


Expert Solution
Questions # 185:

Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P

Options:

A.

Report the decision to the compliance officer


B.

Update details within the risk register.


C.

Reassess the organization's risk tolerance.


D.

Assess the impact of the regulation.


Expert Solution
Questions # 186:

What is the PRIMARY benefit to an organization that maintains an information security governance framework?

Options:

A.

Resources are prioritized to maximize return on investment (ROI)


B.

Information security guidelines are communicated across the enterprise_


C.

The organization remains compliant with regulatory requirements.


D.

Business risks are managed to an acceptable level.


Expert Solution
Questions # 187:

Which of the following BEST facilitates the effective execution of an incident response plan?

Options:

A.

The plan is based on risk assessment results.


B.

The response team is trained on the plan


C.

The plan is based on industry best practice.


D.

The incident response plan aligns with the IT disaster recovery plan (DRP).


Expert Solution
Questions # 188:

Which of the following is the BEST control to protect customer personal information that is stored in the cloud?

Options:

A.

Timely deletion of digital records


B.

Appropriate data anonymization


C.

Strong encryption methods


D.

Strong physical access controls


Expert Solution
Questions # 189:

Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?

Options:

A.

Right-to-audit clause


B.

The third party's incident response plan


C.

Service level agreement (SLA)


D.

The third party's business continuity plan (BCP)


Expert Solution
Questions # 190:

Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?

Options:

A.

Establish an information security steering committee.


B.

Employ a process-based approach for information asset classification.


C.

Utilize an industry-recognized risk management framework.


D.

Provide security awareness training to board executives.


Expert Solution
Questions # 191:

An incident response policy should include:

Options:

A.

A description of testing methodology.


B.

Notification requirements.


C.

An infrastructure diagram.


D.

Recovery time objectives (RTOs).


Expert Solution
Questions # 192:

Which of the following BEST ensures information security governance is aligned with corporate governance?

Options:

A.

A security steering committee including IT representation


B.

A consistent risk management approach


C.

An information security risk register


D.

Integration of security reporting into corporate reporting


Expert Solution
Questions # 193:

What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?

Options:

A.

Vendor service level agreements (SLAs)


B.

Independent review of the vendor


C.

Local laws and regulations


D.

Backup and restoration of data


Expert Solution
Questions # 194:

Which of the following is BEST used to determine the maturity of an information security program?

Options:

A.

Security budget allocation


B.

Organizational risk appetite


C.

Risk assessment results


D.

Security metrics


Expert Solution
Questions # 195:

An information security team has started work to mitigate findings from a recent penetration test. Which of the following presents the GREATEST risk to the organization?

Options:

A.

Some findings were reclassified to low risk after evaluation


B.

Not all findings from the penetration test report were fixed


C.

The penetration testing report did not contain any high-risk findings


D.

Risk classification of penetration test findings was not performed


Expert Solution
Questions # 196:

When developing a categorization method for security incidents, the categories MUST:

Options:

A.

align with industry standards.


B.

be created by the incident handler.


C.

have agreed-upon definitions.


D.

align with reporting requirements.


Expert Solution
Questions # 197:

An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?

Options:

A.

Provide additional training to the incident response team.


B.

Review the incident management procedures.


C.

Interview the incident response team.


D.

Remove the steps from the incident management procedures.


Expert Solution
Questions # 198:

Which of the following is the BEST starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities?

Options:

A.

Controls analysis


B.

Emerging risk review


C.

Penetration testing


D.

Traffic monitoring


Expert Solution
Questions # 199:

Which of the following is the BEST way to obtain support for a new organization-wide information security program?

Options:

A.

Benchmark against similar industry organizations


B.

Deliver an information security awareness campaign.


C.

Publish an information security RACI chart.


D.

Establish an information security strategy committee.


Expert Solution
Questions # 200:

Penetration testing is MOST appropriate when a:

Options:

A.

new system is about to go live.


B.

new system is being designed.


C.

security policy is being developed.


D.

security incident has occurred,


Expert Solution
Viewing page 10 out of 15 pages
Viewing questions 181-200 out of questions