Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 4 out of 16 pages
Viewing questions 61-80 out of questions
Questions # 61:

Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?

Options:

A.

The vendor's proposal allows for contract modification during technology refresh cycles.


B.

The vendor's proposal aligns with the objectives of the organization.


C.

The vendor's proposal requires the provider to have a business continuity plan (BCP).


D.

The vendor's proposal allows for escrow in the event the third party goes out of business.


Expert Solution
Questions # 62:

Detailed business continuity plans (BCPs) should be PRIMARILY based on:

Options:

A.

strategies validated by senior management.


B.

capabilities of available local vendors.


C.

strategies that cover all applications.


D.

cost and resources needed to execute.


Expert Solution
Questions # 63:

Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?

Options:

A.

Risk assessment program


B.

Information security awareness training


C.

Information security governance


D.

Information security metrics


Expert Solution
Questions # 64:

Which type of backup BEST enables an organization to recover data after a ransomware attack?

Options:

A.

Online backup


B.

Incremental backup


C.

Differential backup


D.

Offline backup


Expert Solution
Questions # 65:

The MAIN benefit of implementing a data loss prevention (DLP) solution is to:

Options:

A.

enhance the organization's antivirus controls.


B.

eliminate the risk of data loss.


C.

complement the organization's detective controls.


D.

reduce the need for a security awareness program.


Expert Solution
Questions # 66:

Which of the following provides an information security manager with the MOST useful information on new threats and emerging risks that could impact business objectives?

Options:

A.

External audit report


B.

Internal threat analysis report


C.

Industry threat intelligence report


D.

Internal vulnerability assessment report


Expert Solution
Questions # 67:

Which of the following provides the BEST indication of the return on information security investment?

Options:

A.

Increased annualized loss expectancy (ALE)


B.

Increased number of reported incidents


C.

Reduced annualized loss expectancy (ALE)


D.

Decreased number of reported incidents


Expert Solution
Questions # 68:

The PRIMARY reason to properly classify information assets is to determine:

Options:

A.

appropriate encryption strength using a risk-based approach.


B.

the business impact if assets are compromised.


C.

the appropriate protection based on sensitivity.


D.

user access levels based on the need to know.


Expert Solution
Questions # 69:

Recovery time objectives (RTOs) are an output of which of the following?

Options:

A.

Business continuity plan (BCP)


B.

Disaster recovery plan (DRP)


C.

Service level agreement (SLA)


D.

Business impact analysis (BIA)


Expert Solution
Questions # 70:

A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:

Options:

A.

require that the change be reversed


B.

review the change management process


C.

perform an analysis of the change


D.

report the event to senior management


Expert Solution
Questions # 71:

Which of the following should be done FIRST to prioritize response to incidents?

Options:

A.

Containment


B.

Escalation


C.

Analysis


D.

Triage


Expert Solution
Questions # 72:

Which of the following provides the MOST comprehensive understanding of an organization's information security posture?

Options:

A.

Security maturity assessment results


B.

Threat analysis of the organization's environment


C.

Results of vulnerability assessments


D.

External penetration test findings


Expert Solution
Questions # 73:

An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?

Options:

A.

No owners were identified for some risks.


B.

Business applications had the highest number of risks.


C.

Risk mitigation action plans had no timelines.


D.

Risk mitigation action plan milestones were delayed.


Expert Solution
Questions # 74:

Which of the following should be the PRIMARY basis for an information security strategy?

Options:

A.

The organization's vision and mission


B.

Results of a comprehensive gap analysis


C.

Information security policies


D.

Audit and regulatory requirements


Expert Solution
Questions # 75:

An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?

Options:

A.

File integrity monitoring software


B.

Security information and event management (SIEM) tool


C.

Antivirus software


D.

Intrusion detection system (IDS)


Expert Solution
Questions # 76:

To help ensure that an information security training program is MOST effective, its contents should be:

Options:

A.

based on recent incidents.


B.

based on employees’ roles.


C.

aligned to business processes.


D.

focused on information security policy.


Expert Solution
Questions # 77:

Which of the following is the BEST indicator of a successful intrusion into an organization's systems?

Options:

A.

Decrease in internal network traffic


B.

Increase in the number of failed login attempts


C.

Increase in the number of irregular application requests


D.

Decrease in available storage space


Expert Solution
Questions # 78:

Which of the following is the PRIMARY reason to assign a risk owner in an organization?

Options:

A.

To remediate residual risk


B.

To define responsibilities


C.

To ensure accountability


D.

To identify emerging risk


Expert Solution
Questions # 79:

Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?

Options:

A.

Host patching


B.

Penetration testing


C.

Infrastructure hardening


D.

Data classification


Expert Solution
Questions # 80:

Which of the following is the MOST critical input to developing policies, standards, and procedures to secure information assets?

Options:

A.

Vulnerability assessment


B.

Regulatory requirements


C.

Industry best practices


D.

Enterprise goals


Expert Solution
Viewing page 4 out of 16 pages
Viewing questions 61-80 out of questions