Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 2 out of 15 pages
Viewing questions 21-40 out of questions
Questions # 21:

For an e-business that requires high availability, which of the following design principles is BEST?

Options:

A.

Manual failover to the website of another e-business that meets the user's needs


B.

A single point of entry allowing transactions to be received and processed quickly


C.

Intelligent middleware to direct transactions from a downed system to an alternative


D.

Availability of an adjacent cold site and a standby server with mirrored copies of critical data


Expert Solution
Questions # 22:

Which of the following has the GREATEST impact on the effectiveness of an organization’s security posture?

Options:

A.

Incident metrics are frequently compared against industry benchmarks


B.

New hires are mandated to attend security training


C.

Security is embedded in organizational culture


D.

Senior management has approved and endorsed security practices


Expert Solution
Questions # 23:

Which of the following is MOST important to include in security incident escalation procedures?

Options:

A.

Key objectives of the security program


B.

Recovery procedures


C.

Notification criteria


D.

Containment procedures


Expert Solution
Questions # 24:

Which of the following will ensure confidentiality of content when accessing an email system over the Internet?

Options:

A.

Multi-factor authentication


B.

Digital encryption


C.

Data masking


D.

Digital signatures


Expert Solution
Questions # 25:

An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:

Options:

A.

a control self-assessment (CSA) process.


B.

automated reporting to stakeholders.


C.

a monitoring process for the security policy.


D.

metrics for each milestone.


Expert Solution
Questions # 26:

Which of the following is MOST important for an information security manager to consider when reviewing a security investment plan?

Options:

A.

The plan has summarized IT costs for implementation.


B.

The plan resolves all potential threats to business processes.


C.

The plan focuses on meeting industry best practices and industry standards.


D.

The plan is based on a review of threats and vulnerabilities.


Expert Solution
Questions # 27:

Which of the following is MOST important for an information security manager to consider when determining whether data should be stored?

Options:

A.

Data protection regulations


B.

Data storage limitations


C.

Business requirements


D.

Type and nature of data


Expert Solution
Questions # 28:

Which of the following should be of GREATEST concern to an information security manager when evaluating a cloud service provider?

Options:

A.

Data retention policies are not documented


B.

There is no right to audit the security of the provider


C.

The provider is new to the market and lacks references


D.

Security controls offered by the provider are inadequate


Expert Solution
Questions # 29:

Which of the following is the MOST effective way to detect information security incidents?

Options:

A.

Implementation of regular security awareness programs


B.

Periodic analysis of security event log records


C.

Threshold settings on key risk indicators (KRIs)


D.

Real-time monitoring of network activity


Expert Solution
Questions # 30:

Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?

Options:

A.

Risk assessment


B.

Business impact analysis (BIA)


C.

Penetration test results


D.

Vulnerability scan results


Expert Solution
Questions # 31:

Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?

Options:

A.

The organization's risk tolerance


B.

The organization's mission


C.

Resource availability


D.

Incident response team training


Expert Solution
Questions # 32:

Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?

Options:

A.

Enable multi-factor authentication on user and admin accounts.


B.

Review access permissions annually or whenever job responsibilities change


C.

Lock out accounts after a set number of unsuccessful login attempts.


D.

Delegate the management of access permissions to an independent third party.


Expert Solution
Questions # 33:

From an information security perspective, legal issues associated with a transborder flow of technology-related items are MOST often

Options:

A.

website transactions and taxation.


B.

software patches and corporate date.


C.

encryption tools and personal data.


D.

lack of competition and free trade.


Expert Solution
Questions # 34:

Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?

Options:

A.

A capability and maturity assessment


B.

Detailed analysis of security program KPIs


C.

An information security dashboard


D.

An information security risk register


Expert Solution
Questions # 35:

An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?

Options:

A.

Recovery time objective (RTO)


B.

Recovery point objective (RPO)


C.

Maximum tolerable downtime (MTD)


D.

Service level agreement (SLA)


Expert Solution
Questions # 36:

Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:

Options:

A.

quickly resolved and eliminated regardless of cost.


B.

tracked and reported on until their final resolution.


C.

documented in security awareness programs.


D.

noted and re-examined later if similar weaknesses are found.


Expert Solution
Questions # 37:

Which of the following is the BEST indication of effective information security governance?

Options:

A.

Information security is considered the responsibility of the entire information security team.


B.

Information security controls are assigned to risk owners.


C.

Information security is integrated into corporate governance.


D.

Information security governance is based on an external security framework.


Expert Solution
Questions # 38:

A security incident has been reported within an organization When should an information security manager contact the information owner?

Options:

A.

After the incident has been mitigated


B.

After the incident has been confirmed.


C.

After the potential incident has been togged


D.

After the incident has been contained


Expert Solution
Questions # 39:

An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?

Options:

A.

Determine which country's information security regulations will be used.


B.

Merge the two existing information security programs.


C.

Apply the existing information security program to the acquired company.


D.

Evaluate the information security laws that apply to the acquired company.


Expert Solution
Questions # 40:

What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?

Options:

A.

Developing a dashboard for communicating the metrics


B.

Agreeing on baseline values for the metrics


C.

Benchmarking the expected value of the metrics against industry standards


D.

Aligning the metrics with the organizational culture


Expert Solution
Viewing page 2 out of 15 pages
Viewing questions 21-40 out of questions