Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 3 out of 16 pages
Viewing questions 41-60 out of questions
Questions # 41:

Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?

Options:

A.

The capabilities and expertise of the information security team


B.

The organization's mission statement and roadmap


C.

A prior successful information security strategy


D.

The organization's information technology (IT) strategy


Expert Solution
Questions # 42:

To effectively manage an organization's information security risk, it is MOST important to:

Options:

A.

assign risk management responsibility to an experienced consultant.


B.

periodically identify and correct new systems vulnerabilities.


C.

establish and communicate risk tolerance.


D.

benchmark risk scenarios against peer organizations.


Expert Solution
Questions # 43:

Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?

Options:

A.

Program metrics


B.

Key risk indicators (KRIs)


C.

Risk register


D.

Security strategy


Expert Solution
Questions # 44:

When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?

Options:

A.

Risk owner


B.

Control owner


C.

Business system owner


D.

Application owner


Expert Solution
Questions # 45:

Which of the following is the MOST essential element of an information security program?

Options:

A.

Benchmarking the program with global standards for relevance


B.

Prioritizing program deliverables based on available resources


C.

Involving functional managers in program development


D.

Applying project management practices used by the business


Expert Solution
Questions # 46:

Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?

Options:

A.

The risks are entered in the organization's risk register.


B.

The risks are reported to the business unit's senior management.


C.

The risks are escalated to the IT department for remediation.


D.

The risks are communicated to the central risk function.


Expert Solution
Questions # 47:

Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?

Options:

A.

Residual risk


B.

Regulatory requirements


C.

Risk tolerance


D.

Control objectives


Expert Solution
Questions # 48:

Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?

Options:

A.

Implement a mobile device policy and standard.


B.

Provide employee training on secure mobile device practices.


C.

Implement a mobile device management (MDM) solution.


D.

Require employees to install an effective anti-malware app.


Expert Solution
Questions # 49:

What will BEST facilitate the success of new security initiatives?

Options:

A.

Establish an IT security steering committee.


B.

Include business in security decision making.


C.

Update security policies on a regular basis


D.

Monitor post-implementation security metrics.


Expert Solution
Questions # 50:

An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?

Options:

A.

Install the OS, patches, and application from the original source.


B.

Restore the OS, patches, and application from a backup.


C.

Restore the application and data from a forensic copy.


D.

Remove all signs of the intrusion from the OS and application.


Expert Solution
Questions # 51:

Which of the following would BEST address the risk of a system failing to detect a breach?

Options:

A.

User access reviews


B.

Log monitoring


C.

Vulnerability scanning


D.

Security control testing


Expert Solution
Questions # 52:

Which of the following is MOST important for an information security manager to consider when reviewing a security investment plan?

Options:

A.

The plan has summarized IT costs for implementation.


B.

The plan resolves all potential threats to business processes.


C.

The plan focuses on meeting industry best practices and industry standards.


D.

The plan is based on a review of threats and vulnerabilities.


Expert Solution
Questions # 53:

A technical vulnerability assessment on a personnel information management server should be performed when:

Options:

A.

the data owner leaves the organization unexpectedly.


B.

changes are made to the system configuration.


C.

the number of unauthorized access attempts increases.


D.

an unexpected server outage has occurred.


Expert Solution
Questions # 54:

Which of the following is an example of risk mitigation?

Options:

A.

Purchasing insurance


B.

Discontinuing the activity associated with the risk


C.

Improving security controls


D.

Performing a cost-benefit analysis


Expert Solution
Questions # 55:

Which of the following is the MOST important consideration when attempting to create a security-focused culture?

Options:

A.

Current security strategy benchmarks against peer organizations


B.

The regional rules and legislation regarding information security


C.

The current security awareness level of the employees


D.

The organization’s existing security policies, procedures, and frameworks


Expert Solution
Questions # 56:

The BEST way to integrate information security governance with corporate governance is to ensure:

Options:

A.

the information security steering committee monitors compliance with security policies.


B.

management teams embed information security into business processes.


C.

awareness programs include industry best practice for information security governance.


D.

the information security program is included in regular external audits.


Expert Solution
Questions # 57:

Which of the following sources is MOST useful when planning a business-aligned information security program?

Options:

A.

Security risk register


B.

Information security policy


C.

Business impact analysis (BIA)


D.

Enterprise architecture (EA)


Expert Solution
Questions # 58:

Which of the following is the responsibility of a risk owner?

Options:

A.

Implementing risk treatment plan activities with control owners


B.

Evaluating control effectiveness


C.

Approving risk treatment plans


D.

Approving the selection of risk mitigation measures


Expert Solution
Questions # 59:

In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?

Options:

A.

Access to the hardware


B.

Data encryption


C.

Non-standard event logs


D.

Compressed customer data


Expert Solution
Questions # 60:

An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?

Options:

A.

Prepare an executive summary for senior management


B.

Gather feedback on business impact


C.

Conduct a meeting to capture lessons learned.


D.

Secure and preserve digital evidence for analysis.


Expert Solution
Viewing page 3 out of 16 pages
Viewing questions 41-60 out of questions