Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 2 out of 16 pages
Viewing questions 21-40 out of questions
Questions # 21:

An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:

Options:

A.

organizational alignment


B.

IT strategy alignment


C.

threats to the organization


D.

existing control costs


Expert Solution
Questions # 22:

Which of the following BEST enables users to recover from ransomware or malware attacks?

Options:

A.

Incident response plans


B.

Frequent system backups


C.

Regular antivirus updates


D.

End-user awareness training


Expert Solution
Questions # 23:

When drafting the corporate privacy statement for a public website, which of the following MUST be included?

Options:

A.

Limited liability clause


B.

Explanation of information usage


C.

Information encryption requirements


D.

Access control requirements


Expert Solution
Questions # 24:

An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?

Options:

A.

Conduct user awareness training within the IT function.


B.

Propose that IT update information security policies and procedures.


C.

Determine the risk related to noncompliance with the policy.


D.

Request that internal audit conduct a review of the policy development process,


Expert Solution
Questions # 25:

An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:

Options:

A.

determine the security exposures.


B.

assess the ability to integrate the security department operations.


C.

ensure compliance with international standards.


D.

evaluate the security policy and standards.


Expert Solution
Questions # 26:

Which of the following BEST facilitates the development of a comprehensive information security policy?

Options:

A.

Alignment with an established information security framework


B.

An established internal audit program


C.

Security key performance indicators (KPIs)


D.

Areview of recent information security incidents


Expert Solution
Questions # 27:

A new risk has been identified in a high availability system. The BEST course of action is to:

Options:

A.

Perform a cost-benefit analysis for mitigating controls


B.

Recommend risk acceptance to the business owner


C.

Develop and implement a plan to mitigate the identified risk


D.

Evaluate and prioritize the identified risk


Expert Solution
Questions # 28:

Which of the following is the GREATEST benefit of performing a tabletop exercise of the business continuity plan (BCP)?

Options:

A.

It identifies appropriate follow-up work to address shortcomings in the plan.


B.

It allows for greater participation and planning from the business side.


C.

It helps in assessing the availability of compatible backup hardware.


D.

It provides a low-cost method of assessing the BCP's completeness.


Expert Solution
Questions # 29:

When building support for an information security program, which of the following elements is MOST important?

Options:

A.

Identification of existing vulnerabilities


B.

Information risk assessment


C.

Business impact analysis (BIA)


D.

Threat analysis


Expert Solution
Questions # 30:

Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?

Options:

A.

The strategy aligns with management’s acceptable level of risk.


B.

The strategy addresses ineffective information security controls.


C.

The strategy aligns with industry benchmarks and standards.


D.

The strategy addresses organizational maturity and the threat environment.


Expert Solution
Questions # 31:

When establishing an information security governance framework, it is MOST important for an information security manager to understand:

Options:

A.

information security best practices.


B.

risk management techniques.


C.

the threat environment.


D.

the corporate culture.


Expert Solution
Questions # 32:

An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.

Which of the following should be given immediate focus?

Options:

A.

Moving to a zero trust access model


B.

Enabling network-level authentication


C.

Enhancing cyber response capability


D.

Strengthening endpoint security


Expert Solution
Questions # 33:

An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?

Options:

A.

Conduct phishing awareness training.


B.

Implement disciplinary procedures.


C.

Establish an acceptable use policy.


D.

Assess and update spam filtering rules.


Expert Solution
Questions # 34:

An organization plans to leverage popular social network platforms to promote its products and services. Which of the following is the BEST course of action for the information security manager to support this initiative?

Options:

A.

Establish processes to publish content on social networks.


B.

Assess the security risk associated with the use of social networks.


C.

Conduct vulnerability assessments on social network platforms.


D.

Develop security controls for the use of social networks.


Expert Solution
Questions # 35:

When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:

Options:

A.

ensure alignment with industry encryption standards.


B.

ensure that systems that handle credit card data are segmented.


C.

review industry best practices for handling secure payments.


D.

review corporate policies regarding credit card information.


Expert Solution
Questions # 36:

Which of the following is the BEST approach for data owners to use when defining access privileges for users?

Define access privileges based on user roles.

Adopt user account settings recommended by the vendor.

Perform a risk assessment of the users' access privileges.

Options:

A.

Implement an identity and access management (IDM) tool.


Expert Solution
Questions # 37:

Which of the following should be the PRIMARY basis for a severity hierarchy for information security incident classification?

Options:

A.

Availability of resources


B.

Root cause analysis results


C.

Adverse effects on the business


D.

Legal and regulatory requirements


Expert Solution
Questions # 38:

Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?

Options:

A.

Execute a risk treatment plan.


B.

Review contracts and statements of work (SOWs) with vendors.


C.

Implement data regionalization controls.


D.

Determine current and desired state of controls.


Expert Solution
Questions # 39:

Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?

Options:

A.

Manage business process changes.


B.

Update business impact analyses (BIAs) on a regular basis.


C.

Conduct periodic testing.


D.

Review and update emergency contact lists.


Expert Solution
Questions # 40:

Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?

Options:

A.

Right-to-audit clause


B.

The third party's incident response plan


C.

Service level agreement (SLA)


D.

The third party's business continuity plan (BCP)


Expert Solution
Viewing page 2 out of 16 pages
Viewing questions 21-40 out of questions