Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 15 out of 15 pages
Viewing questions 281-300 out of questions
Questions # 281:

To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?

Options:

A.

Request the service provider comply with information security policy.


B.

Review a recent independent audit report of the service provider.


C.

Assess the level of security awareness of the service provider.


D.

Review samples of service level reports from the service provider.


Expert Solution
Questions # 282:

Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?

Options:

A.

Conduct a business impact analysis (BIA).


B.

Conduct periodic awareness training.


C.

Perform a security gap analysis.


D.

Perform network penetration testing.


Expert Solution
Questions # 283:

What type of control is being implemented when a security information and event management (SIEM) system is installed?

Options:

A.

Preventive


B.

Deterrent


C.

Detective


D.

Corrective


Expert Solution
Questions # 284:

Before approving the implementation of a new security solution, senior management requires a business case. Which of the following would BEST support the justification for investment?

Options:

A.

The solution contributes to business strategy.


B.

The solution improves business risk tolerance levels.


C.

The solution improves business resiliency.


D.

The solution reduces the cost of noncompliance with regulations.


Expert Solution
Questions # 285:

Who is accountable for approving an information security governance framework?

Options:

A.

The board of directors


B.

The chief information security officer (ClSO)


C.

The enterprise risk committee


D.

The chief information officer (CIO)


Expert Solution
Questions # 286:

An experienced information security manager joins a new organization and begins by conducting an audit of all key IT processes. Which of the following findings about the vulnerability management program should be of GREATEST concern?

Options:

A.

Identified vulnerabilities are not published and communicated in awareness programs.


B.

Identified vulnerabilities are not logged and resolved in a timely manner.


C.

The number of vulnerabilities identified exceeds industry benchmarks. D. Vulnerabilities are identified by internal staff rather than by external consultants.


Expert Solution
Questions # 287:

An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?

Options:

A.

Conduct a risk assessment.


B.

Communicate the changes to stakeholders.


C.

Update the organization's risk register.


D.

Develop a policy exception process.


Expert Solution
Questions # 288:

Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?

Options:

A.

Establishing the root cause of the incident


B.

Identifying attack vectors utilized in the incident


C.

When business operations were restored after the incident


D.

How incident management processes were executed


Expert Solution
Questions # 289:

Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?

Options:

A.

Maintaining a repository base of security policies


B.

Measuring impact of exploits on business processes


C.

Facilitating the monitoring of risk occurrences


D.

Redirecting event logs to an alternate location for business continuity plan


Expert Solution
Questions # 290:

Which of the following is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?

Options:

A.

Poor documentation of results and lessons learned


B.

Lack of communication to affected users


C.

Disruption to the production environment


D.

Lack of coordination among departments


Expert Solution
Questions # 291:

Which of the following is the PRIMARY role of the information security manager in application development?

Options:

A.

To ensure security is integrated into the system development life cycle (SDLC)


B.

To ensure compliance with industry best practice


C.

To ensure enterprise security controls are implemented


D.

To ensure control procedures address business risk


Expert Solution
Viewing page 15 out of 15 pages
Viewing questions 281-300 out of questions