Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 11 out of 15 pages
Viewing questions 201-220 out of questions
Questions # 201:

Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?

Options:

A.

Implement compensating controls.


B.

Communicate consequences for future instances.


C.

Enhance the data loss prevention (DLP) solution.


D.

Improve the security awareness training program.


Expert Solution
Questions # 202:

Which of the following is necessary to ensure consistent protection for an organization's information assets?

Options:

A.

Classification model


B.

Control assessment


C.

Data ownership


D.

Regulatory requirements


Expert Solution
Questions # 203:

A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:

Options:

A.

analysis of current threat landscape.


B.

historical data of reported incidents.


C.

projected return on investment (ROI).


D.

industry benchmarking gap analysis.


Expert Solution
Questions # 204:

Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?

Options:

A.

Skills required for the incident response team


B.

A list of external resources to assist with incidents


C.

Service level agreements (SLAs)


D.

A detailed incident notification process


Expert Solution
Questions # 205:

An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?

Options:

A.

Responsible entities


B.

Key risk indicators (KRIS)


C.

Compensating controls


D.

Potential business impact


Expert Solution
Questions # 206:

Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?

Options:

A.

Data owner


B.

Business owner


C.

Information security manager


D.

Compliance manager


Expert Solution
Questions # 207:

Which of the following is the MOST critical factor for information security program success?

Options:

A.

comprehensive risk assessment program for information security


B.

The information security manager's knowledge of the business


C.

Security staff with appropriate training and adequate resources


D.

Ongoing audits and addressing open items


Expert Solution
Questions # 208:

Which of the following is the BEST method to ensure compliance with password standards?

Options:

A.

Implementing password-synchronization software


B.

Using password-cracking software


C.

Automated enforcement of password syntax rules


D.

A user-awareness program


Expert Solution
Questions # 209:

Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?

Options:

A.

Increase the frequency of system backups.


B.

Review the mitigating security controls.


C.

Notify staff members of the threat.


D.

Assess the risk to the organization.


Expert Solution
Questions # 210:

Which of the following documents should contain the INITIAL prioritization of recovery of services?

Options:

A.

IT risk analysis


B.

Threat assessment


C.

Business impact analysis (BIA)


D.

Business process map


Expert Solution
Questions # 211:

Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?

Options:

A.

Suspend the data exchange with the provider


B.

Notify appropriate regulatory authorities of the breach.


C.

Initiate the business continuity plan (BCP)


D.

Validate the breach with the provider


Expert Solution
Questions # 212:

Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:

Options:

A.

Tracked and reported on until their final resolution


B.

Noted and re-examined later if similar weaknesses are found


C.

Documented in security awareness programs


D.

Quickly resolved and eliminated regardless of cost


Expert Solution
Questions # 213:

Which of the following is the BEST way to enhance training for incident response teams?

Options:

A.

Perform post-incident reviews.


B.

Establish incident key performance indicators (KPIs).


C.

Conduct interviews with organizational units.


D.

Participate in emergency response activities.


Expert Solution
Questions # 214:

A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?

Options:

A.

Conduct automated scans on applications before deployment.


B.

Supplement existing development teams with security engineers.


C.

Integrate information security into existing change management.


D.

Create a new governance council for application security.


Expert Solution
Questions # 215:

Recovery time objectives (RTOs) are BEST determined by:

Options:

A.

business managers


B.

business continuity officers


C.

executive management


D.

database administrators (DBAs).


Expert Solution
Questions # 216:

Prior to conducting a forensic examination, an information security manager should:

Options:

A.

boot the original hard disk on a clean system.


B.

create an image of the original data on new media.


C.

duplicate data from the backup media.


D.

shut down and relocate the server.


Expert Solution
Questions # 217:

Which of the following is the MOST important objective of post-incident review activities?

Options:

A.

Evidence collection


B.

Continuous improvement


C.

Incident triage


D.

Incident documentation


Expert Solution
Questions # 218:

When establishing an information security governance framework, it is MOST important for an information security manager to understand:

Options:

A.

information security best practices.


B.

risk management techniques.


C.

the threat environment.


D.

the corporate culture.


Expert Solution
Questions # 219:

An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?

Options:

A.

Include security requirements in the contract


B.

Assess security controls.


C.

Perform a risk assessment


D.

Review data architecture.


Expert Solution
Questions # 220:

Which of the following would BEST justify continued investment in an information security program?

Options:

A.

Reduction in residual risk


B.

Security framework alignment


C.

Speed of implementation


D.

Industry peer benchmarking


Expert Solution
Viewing page 11 out of 15 pages
Viewing questions 201-220 out of questions