Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 12 out of 15 pages
Viewing questions 221-240 out of questions
Questions # 221:

Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?

Options:

A.

Security risk analysis


B.

Gap assessment


C.

Maturity assessment


D.

Vulnerability scan report


Expert Solution
Questions # 222:

Implementing the principle of least privilege PRIMARILY requires the identification of:

Options:

A.

job duties


B.

data owners


C.

primary risk factors.


D.

authentication controls


Expert Solution
Questions # 223:

Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?

Options:

A.

To improve awareness of information security


B.

To disclose the root cause of the incident


C.

To increase goodwill toward the organization


D.

To comply with regulations regarding notification


Expert Solution
Questions # 224:

Which of the following BEST enables an organization to continuously assess the information security risk posture?

Options:

A.

Key risk indicators (KRIs)


B.

Periodic review of the risk register


C.

Degree of senior management support


D.

Compliance with industry regulations


Expert Solution
Questions # 225:

In which cloud model does the cloud service buyer assume the MOST security responsibility?

Options:

A.

Disaster Recovery as a Service (DRaaS)


B.

Infrastructure as a Service (laaS)


C.

Platform as a Service (PaaS)


D.

Software as a Service (SaaS)


Expert Solution
Questions # 226:

Which of the following BEST facilitates the development of a comprehensive information security policy?

Options:

A.

Alignment with an established information security framework


B.

An established internal audit program


C.

Security key performance indicators (KPIs)


D.

Areview of recent information security incidents


Expert Solution
Questions # 227:

Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?

Options:

A.

Removable storage media


B.

Disaster recovery plan (DRP)


C.

Offsite data backups


D.

Encrypted data drives


Expert Solution
Questions # 228:

Which of the following elements of a service contract would BEST enable an organization to monitor the information security risk associated with a cloud service provider?

Options:

A.

Indemnification clause


B.

Breach detection and notification


C.

Compliance status reporting


D.

Physical access to service provider premises


Expert Solution
Questions # 229:

A PRIMARY purpose of creating security policies is to:

Options:

A.

define allowable security boundaries.


B.

communicate management's security expectations.


C.

establish the way security tasks should be executed.


D.

implement management's security governance strategy.


Expert Solution
Questions # 230:

Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?

Options:

A.

Each process is assigned to a responsible party.


B.

The contact list is regularly updated.


C.

Minimum regulatory requirements are maintained.


D.

Senior management approval has been documented.


Expert Solution
Questions # 231:

Which of the following would be MOST helpful when creating information security policies?

Options:

A.

The information security framework


B.

Business impact analysis (BIA)


C.

Information security metrics


D.

Risk assessment results


Expert Solution
Questions # 232:

A finance department director has decided to outsource the organization's budget application and has identified potential providers. Which of the following actions should be initiated FIRST by IN information security manager?

Options:

A.

Determine the required security controls for the new solution


B.

Review the disaster recovery plans (DRPs) of the providers


C.

Obtain audit reports on the service providers' hosting environment


D.

Align the roles of the organization's and the service providers' stats.


Expert Solution
Questions # 233:

An information security manager is alerted to multiple security incidents across different business units, with unauthorized access to sensitive data and potential data exfiltration from critical systems. Which of the following is the BEST course of action to appropriately classify and prioritize these incidents?

Options:

A.

Assemble the incident response team to evaluate the incidents


B.

Initiate the crisis communication plan to notify stakeholders of the incidents


C.

Engage external incident response consultants to conduct an independent investigation


D.

Prioritize the incidents based on data classification standards


Expert Solution
Questions # 234:

When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?

Options:

A.

Managing the impact


B.

Identifying unacceptable risk levels


C.

Assessing vulnerabilities


D.

Evaluating potential threats


Expert Solution
Questions # 235:

Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?

Options:

A.

Lack of knowledgeable personnel


B.

Lack of communication processes


C.

Lack of process documentation


D.

Lack of alignment with organizational goals


Expert Solution
Questions # 236:

Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?

Options:

A.

Publish adopted information security standards.


B.

Perform annual information security compliance reviews.


C.

Implement an information security governance framework.


D.

Define penalties for information security noncompliance.


Expert Solution
Questions # 237:

An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?

Options:

A.

Conduct phishing awareness training.


B.

Implement disciplinary procedures.


C.

Establish an acceptable use policy.


D.

Assess and update spam filtering rules.


Expert Solution
Questions # 238:

Which of the following provides the BEST indication of the return on information security investment?

Options:

A.

Increased annualized loss expectancy (ALE)


B.

Increased number of reported incidents


C.

Reduced annualized loss expectancy (ALE)


D.

Decreased number of reported incidents


Expert Solution
Questions # 239:

When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:

Options:

A.

consider the organizations business strategy.


B.

consider the strategic objectives of the program.


C.

leverage industry benchmarks.


D.

identify the program's risk and compensating controls.


Expert Solution
Questions # 240:

Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?

Options:

A.

Program metrics


B.

Key risk indicators (KRIs)


C.

Risk register


D.

Security strategy


Expert Solution
Viewing page 12 out of 15 pages
Viewing questions 221-240 out of questions