Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 14 out of 15 pages
Viewing questions 261-280 out of questions
Questions # 261:

Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?

Options:

A.

Mapping the risks to the security classification scheme


B.

Illustrating risk on a heat map


C.

Mapping the risks to existing controls


D.

Providing a technical risk assessment report


Expert Solution
Questions # 262:

Which of the following is the GREATEST benefit of using AI tools in security operations?

Options:

A.

Rapid detection and response to threats


B.

Prioritized vulnerabilities


C.

Reduced time and effort required to patch systems


D.

Defined risk tolerance


Expert Solution
Questions # 263:

Which of the following should be done FIRST when implementing a security program?

Options:

A.

Perform a risk analysis


B.

Implement data encryption.


C.

Create an information asset inventory.


D.

Determine the value of information assets.


Expert Solution
Questions # 264:

Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.

Which of the following should be the PRIMARY focus of Company A's information security manager?

Options:

A.

The organizational structure of Company B


B.

The cost to align to Company A's security policies


C.

Company A's security architecture


D.

Company B's security policies


Expert Solution
Questions # 265:

An internal audit has revealed that a number of information assets have been inappropriately classified. To correct the classifications, the remediation accountability should be assigned to:

Options:

A.

the business users.


B.

the information owners.


C.

the system administrators.


D.

senior management.


Expert Solution
Questions # 266:

Which of the following is MOST important for the improvement of a business continuity plan (BCP)?

Options:

A.

Incorporating lessons learned


B.

Implementing an IT resilience solution


C.

Implementing management reviews


D.

Documenting critical business processes


Expert Solution
Questions # 267:

Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?

Options:

A.

Network address translation (NAT)


B.

Message hashing


C.

Transport Layer Security (TLS)


D.

Multi-factor authentication


Expert Solution
Questions # 268:

An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?

Options:

A.

Employees use smartphone tethering when accessing from remote locations.


B.

Employees physically lock PCs when leaving the immediate area.


C.

Employees are trained on the acceptable use policy.


D.

Employees use the VPN when accessing the organization's online resources.


Expert Solution
Questions # 269:

An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?

Options:

A.

The number of blocked external attacks is not representative of the true threat profile.


B.

The number of blocked external attacks will vary by month, causing inconsistent graphs.


C.

The number of blocked external attacks is an indicator of the organization's popularity.


D.

The number of blocked external attacks over time does not explain the attackers' motivations.


Expert Solution
Questions # 270:

Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?

Options:

A.

Incorporate policy statements derived from third-party standards and benchmarks.


B.

Adhere to a unique corporate privacy and security standard


C.

Establish baseline standards for all locations and add supplemental standards as required


D.

Require that all locations comply with a generally accepted set of industry


Expert Solution
Questions # 271:

Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?

Options:

A.

Maturity of incident response activities


B.

Threat environment


C.

Quantity of impacted assets


D.

Incident impact


Expert Solution
Questions # 272:

When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:

Options:

A.

ensure alignment with industry encryption standards.


B.

ensure that systems that handle credit card data are segmented.


C.

review industry best practices for handling secure payments.


D.

review corporate policies regarding credit card information.


Expert Solution
Questions # 273:

Which of the following is MOST helpful for protecting an enterprise from advanced persistent threats (APTs)?

Options:

A.

Updated security policies


B.

Defined security standards


C.

Threat intelligence


D.

Regular antivirus updates


Expert Solution
Questions # 274:

If the investigation of an incident is not completed within the time allocated in the incident response plan, which of the following actions should be taken by the incident response team?

Options:

A.

Initiate the escalation process.


B.

Continue the investigation.


C.

Invoke the business continuity plan (BCP).


D.

Engage the crisis management team.


Expert Solution
Questions # 275:

Which of the following is the BEST justification for making a revision to a password policy?

Options:

A.

Vendor recommendation


B.

Audit recommendation


C.

A risk assessment


D.

Industry best practice


Expert Solution
Questions # 276:

A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?

Options:

A.

Ability to test the patch prior to deployment


B.

Documentation of patching procedures


C.

Adequacy of the incident response plan


D.

Availability of resources to implement controls


Expert Solution
Questions # 277:

In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?

Options:

A.

Maturity of the security policy


B.

Clarity of security roles and responsibilities


C.

Corporate culture


D.

Corporate risk framework


Expert Solution
Questions # 278:

Which of the following should an information security manager do FIRST when noncompliance with security standards is identified?

Options:

A.

Report the noncompliance to senior management.


B.

Validate the noncompliance.


C.

Include the noncompliance in the risk register.


D.

Implement compensating controls to mitigate the noncompliance.


Expert Solution
Questions # 279:

Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?

Options:

A.

Mobile application control


B.

Inconsistent device security


C.

Configuration management


D.

End user acceptance


Expert Solution
Questions # 280:

Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?

Options:

A.

Integrity


B.

Authenticity


C.

Confidentiality


D.

Nonrepudiation


Expert Solution
Viewing page 14 out of 15 pages
Viewing questions 261-280 out of questions