Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 13 out of 15 pages
Viewing questions 241-260 out of questions
Questions # 241:

The PRIMARY goal of a post-incident review should be to:

Options:

A.

establish the cost of the incident to the business.


B.

determine why the incident occurred.


C.

identify policy changes to prevent a recurrence.


D.

determine how to improve the incident handling process.


Expert Solution
Questions # 242:

Which of the following BEST protects against emerging advanced persistent threat (APT) actors?

Options:

A.

Honeypot environment


B.

Updated security awareness materials


C.

Ongoing incident response training


D.

Proactive monitoring


Expert Solution
Questions # 243:

When analyzing the emerging risk and threat landscape, an information security manager should FIRST:

Options:

A.

determine the impact if threats materialize.


B.

determine the sources of emerging threats.


C.

review historical threats within the industry.


D.

map threats to business assets.


Expert Solution
Questions # 244:

An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?

Options:

A.

Refer the issue to internal audit for a recommendation.


B.

Re-classify the data and increase the security level to meet business risk.


C.

Instruct the relevant system owners to reclassify the data.


D.

Complete a risk assessment and refer the results to the data owners.


Expert Solution
Questions # 245:

Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?

Options:

A.

Mapping risk scenarios according to sensitivity of data


B.

Reviewing mitigating and compensating controls for each risk scenario


C.

Mapping the risk scenarios by likelihood and impact on a chart


D.

Performing a risk assessment on the laaS provider


Expert Solution
Questions # 246:

Which of the following should be the KEY consideration when creating an information security communication plan with industry peers?

Options:

A.

Balancing the benefits of information sharing with the drawbacks of sharing sensitive information


B.

Reducing the costs associated with information sharing by automating the process


C.

Ensuring information is detailed enough to be of use to other organizations


D.

Notifying the legal department whenever incident-related information is shared


Expert Solution
Questions # 247:

Which of the following is the BEST course of action when an information security manager identifies that systems are vulnerable to emerging threats?

Options:

A.

Frequently update systems and monitor the threat landscape.


B.

Monitor the network containing the affected systems for malicious traffic.


C.

Increase awareness of the threats among employees who work with the systems.


D.

Notify senior management and key stakeholders of the threats.


Expert Solution
Questions # 248:

Which of the following would BEST enable the timely execution of an incident response plan?

Options:

A.

The introduction of a decision support tool


B.

Definition of trigger events


C.

Clearly defined data classification process


D.

Centralized service desk


Expert Solution
Questions # 249:

Which of the following is the BEST way to prevent insider threats?

Options:

A.

Enforce separation of duties and least privilege access.


B.

Conduct organization-wide security awareness training.


C.

Implement logging for all access activities.


D.

Implement strict security policies and password controls.


Expert Solution
Questions # 250:

For which of the following is it MOST important that system administrators be restricted to read-only access?

Options:

A.

User access log files


B.

Administrator user profiles


C.

Administrator log files


D.

System logging options


Expert Solution
Questions # 251:

Which of the following is the BEST strategy when determining an organization’s approach to risk treatment?

Options:

A.

Advancing the maturity of existing controls based on risk tolerance


B.

Prioritizing controls that directly mitigate the organization's most critical risks


C.

Implementing risk mitigation controls that are considered quick wins


D.

Implementing a one-size-fits-all set of controls across all organizational units


Expert Solution
Questions # 252:

A business continuity plan (BCP) should contain:

Options:

A.

Hardware and software inventories


B.

Data restoration procedures


C.

Information about eradication activities


D.

Criteria for activation


Expert Solution
Questions # 253:

Which of the following will have the GREATEST influence on the successful adoption of an information security governance program?

Options:

A.

Security policies


B.

Control effectiveness


C.

Security management processes


D.

Organizational culture


Expert Solution
Questions # 254:

Which of the following roles is BEST able to influence the security culture within an organization?

Options:

A.

Chief information security officer (CISO)


B.

Chief information officer (CIO)


C.

Chief executive officer (CEO)


D.

Chief operating officer (COO)


Expert Solution
Questions # 255:

An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?

Options:

A.

Immediately suspend the executives' access privileges.


B.

Notify the CISO of the security policy violation.


C.

Perform a full review of all system transactions over the past 90 days.


D.

Perform a system access review.


Expert Solution
Questions # 256:

An organization has determined that fixing a security vulnerability in a critical application is too costly to be feasible, but the impact is material to the business. Which of the following is the MOST appropriate risk treatment?

Options:

A.

Purchase cybersecurity insurance.


B.

Accept the risk associated with continued use of the application.


C.

Implement compensating controls for the application.


D.

Discontinue using the application.


Expert Solution
Questions # 257:

Reverse lookups can be used to prevent successful:

Options:

A.

denial of service (DoS) attacks


B.

session hacking


C.

phishing attacks


D.

Internet protocol (IP) spoofing


Expert Solution
Questions # 258:

Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?

Options:

A.

Backups are maintained offline and regularly tested.


B.

Impacted networks can be detached at the network switch level.


C.

Production data is continuously replicated between primary and secondary sites.


D.

Backups are maintained on multiple sites and regularly reviewed.


Expert Solution
Questions # 259:

Which of the following should be the PRIMARY focus for an information security manager when reviewing access controls for data stored in an off-premise cloud environment?

Options:

A.

Reviewing and updating access controls in response to changes in organizational structure


B.

Implementing strong password policies and enforcing regular password changes


C.

Ensuring access is granted to only those individuals whose job functions require it


D.

Implementing strong encryption protocols to protect sensitive data


Expert Solution
Questions # 260:

When building support for an information security program, which of the following elements is MOST important?

Options:

A.

Identification of existing vulnerabilities


B.

Information risk assessment


C.

Business impact analysis (BIA)


D.

Threat analysis


Expert Solution
Viewing page 13 out of 15 pages
Viewing questions 241-260 out of questions