Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 3 out of 15 pages
Viewing questions 41-60 out of questions
Questions # 41:

A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?

Options:

A.

Ensure a risk assessment is performed to evaluate the findings


B.

Ensure vulnerabilities found are resolved within acceptable timeframes


C.

Request funding needed to resolve the top vulnerabilities


D.

Report findings to senior management


Expert Solution
Questions # 42:

Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?

Options:

A.

Availability of web application firewall logs.


B.

Capability of online virtual machine analysis


C.

Availability of current infrastructure documentation


D.

Capability to take a snapshot of virtual machines


Expert Solution
Questions # 43:

Which of the following is the MOST important outcome of a post-incident review?

Options:

A.

The impact of the incident is reported to senior management.


B.

The system affected by the incident is restored to its prior state.


C.

The person responsible for the incident is identified.


D.

The root cause of the incident is determined.


Expert Solution
Questions # 44:

Which of the following is the BEST indicator of a successful intrusion into an organization's systems?

Options:

A.

Decrease in internal network traffic


B.

Increase in the number of failed login attempts


C.

Increase in the number of irregular application requests


D.

Decrease in available storage space


Expert Solution
Questions # 45:

Which of the following would be MOST useful when determining the business continuity strategy for a large organization's data center?

Options:

A.

Stakeholder feedback analysis


B.

Business continuity risk analysis


C.

Incident root cause analysis


D.

Business impact analysis (BIA)


Expert Solution
Questions # 46:

Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?

Options:

A.

Mail relay server


B.

Proxy server


C.

Database server


D.

Application server


Expert Solution
Questions # 47:

What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?

Options:

A.

Define the issues to be addressed.


B.

Perform a cost-benefit analysis.


C.

Calculate the total cost of ownership (TCO).


D.

Conduct a feasibility study.


Expert Solution
Questions # 48:

A balanced scorecard MOST effectively enables information security:

Options:

A.

risk management


B.

project management


C.

governance


D.

performance


Expert Solution
Questions # 49:

Which of the following tasks would provide a newly appointed information security manager with the BEST view of the organization's existing security posture?

Options:

A.

Reviewing policies and procedures


B.

Performing a risk assessment


C.

Interviewing business managers and employees


D.

Performing a business impact analysis (BIA)


Expert Solution
Questions # 50:

An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?

Options:

A.

Conduct an information security audit.


B.

Validate the relevance of the information.


C.

Perform a gap analysis.


D.

Inform senior management


Expert Solution
Questions # 51:

During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?

Options:

A.

Install patches on all existing systems.


B.

Review the vulnerability management process.


C.

Report the root cause of the vulnerability to senior management.


D.

Scan to determine whether the vulnerability is present on other systems.


Expert Solution
Questions # 52:

Which of the following should be done NEXT following senior management's decision to comply with new personal data regulations that are much more stringent than those currently followed to avoid massive fines?

Options:

A.

Encrypt data in transit and at rest.


B.

Complete a return on investment (ROI) analysis.


C.

Create and implement a data minimization plan.


D.

Conduct a gap analysis.


Expert Solution
Questions # 53:

An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:

Options:

A.

disable the user's access to corporate resources.


B.

terminate the device connectivity.


C.

remotely wipe the device


D.

escalate to the user's management


Expert Solution
Questions # 54:

Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?

Options:

A.

Implement a data loss prevention (DLP) system


B.

Disable all incoming cloud mail services


C.

Conduct awareness training across the organization


D.

Require acknowledgment of the acceptable use policy


Expert Solution
Questions # 55:

Which of the following BEST demonstrates the added value of an information security program?

Options:

A.

Security baselines


B.

A gap analysis


C.

A SWOT analysis


D.

A balanced scorecard


Expert Solution
Questions # 56:

Which of the following is MOST important to consider when determining asset valuation?

Options:

A.

Asset recovery cost


B.

Asset classification level


C.

Cost of insurance premiums


D.

Potential business loss


Expert Solution
Questions # 57:

Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?

Options:

A.

Alignment with financial reporting


B.

Alignment with business initiatives


C.

Alignment with industry frameworks


D.

Alignment with risk appetite


Expert Solution
Questions # 58:

Which of the following activities is MOST appropriate to conduct during the eradication phase of a cyber incident response?

Options:

A.

Restore affected systems for normal operations.


B.

Mitigate exploited vulnerabilities to stop future incidents.


C.

Estimate the amount of damage caused by the incident.


D.

Isolate affected systems to prevent further damage


Expert Solution
Questions # 59:

What is the PRIMARY objective of implementing standard security configurations?

Options:

A.

Maintain a flexible approach to mitigate potential risk to unsupported systems.


B.

Minimize the operational burden of managing and monitoring unsupported systems.


C.

Control vulnerabilities and reduce threats from changed configurations.


D.

Compare configurations between supported and unsupported systems.


Expert Solution
Questions # 60:

Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?

Options:

A.

Providing training from third-party forensics firms


B.

Obtaining industry certifications for the response team


C.

Conducting tabletop exercises appropriate for the organization


D.

Documenting multiple scenarios for the organization and response steps


Expert Solution
Viewing page 3 out of 15 pages
Viewing questions 41-60 out of questions