Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 4 out of 15 pages
Viewing questions 61-80 out of questions
Questions # 61:

Which of the following is MOST important when developing an information security strategy?

Options:

A.

Engage stakeholders.


B.

Assign data ownership.


C.

Determine information types.


D.

Classify information assets.


Expert Solution
Questions # 62:

Which of the following would MOST effectively ensure that a new server is appropriately secured?

Options:

A.

Performing secure code reviews


B.

Enforcing technical security standards


C.

Conducting penetration testing


D.

Initiating security scanning


Expert Solution
Questions # 63:

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

Options:

A.

Wipe and reset the endpoint device.


B.

Isolate the endpoint device.


C.

Power off the endpoint device.


D.

Run a virus scan on the endpoint device.


Expert Solution
Questions # 64:

Which of the following BEST enables an organization to identify and contain security incidents?

Options:

A.

Risk assessments


B.

Threat modeling


C.

Continuous monitoring


D.

Tabletop exercises


Expert Solution
Questions # 65:

Which of the following is the PRIMARY objective of a cyber resilience strategy?

Options:

A.

Business continuity


B.

Regulatory compliance


C.

Employee awareness


D.

Executive support


Expert Solution
Questions # 66:

Which of the following risk responses is an example of risk transfer?

Options:

A.

Purchasing cybersecurity insurance


B.

Moving risk ownership to another department


C.

Conducting off-site backups


D.

Utilizing third-party applications


Expert Solution
Questions # 67:

Which of the following is MOST important to include in an information security policy?

Options:

A.

Best practices


B.

Management objectives


C.

Baselines


D.

Maturity levels


Expert Solution
Questions # 68:

An information security program is BEST positioned for success when it is closely aligned with:

Options:

A.

information security best practices.


B.

recognized industry frameworks.


C.

information security policies.


D.

the information security strategy.


Expert Solution
Questions # 69:

Senior management has expressed concern that the organization's intrusion prevention system (IPS) may repeatedly disrupt business operations Which of the following BEST indicates that the information security manager has tuned the system to address this concern?

Options:

A.

Increasing false negatives


B.

Decreasing false negatives


C.

Decreasing false positives


D.

Increasing false positives


Expert Solution
Questions # 70:

Which of the following should be done FIRST when developing a business continuity plan (BCP)?

Options:

A.

Review current recovery policies.


B.

Define the organizational strategy.


C.

Prioritize the critical processes.


D.

Review existing cyber insurance coverage.


Expert Solution
Questions # 71:

An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?

Options:

A.

Red team exercise


B.

Black box penetration test


C.

Disaster recovery exercise


D.

Tabletop exercise


Expert Solution
Questions # 72:

Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?

Options:

A.

To alert on unacceptable risk


B.

To identify residual risk


C.

To reassess risk appetite


D.

To benchmark control performance


Expert Solution
Questions # 73:

Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?

Options:

A.

Ability to monitor and control incident management costs


B.

More visibility to the impact of disruptions


C.

Effective protection of information assets


D.

Optimized allocation of recovery resources


Expert Solution
Questions # 74:

The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:

Options:

A.

signature analysis.


B.

behavior analysis.


C.

penetration testing.


D.

data packet analysis.


Expert Solution
Questions # 75:

During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:

Options:

A.

baseline security controls.


B.

benchmarking security metrics.


C.

security objectives.


D.

cost-benefit analyses.


Expert Solution
Questions # 76:

Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?

Options:

A.

The vendor's proposal allows for contract modification during technology refresh cycles.


B.

The vendor's proposal aligns with the objectives of the organization.


C.

The vendor's proposal requires the provider to have a business continuity plan (BCP).


D.

The vendor's proposal allows for escrow in the event the third party goes out of business.


Expert Solution
Questions # 77:

An organization uses a security standard that has undergone a major revision by the certifying authority. The old version of the standard will no longer be used for organizations wishing to maintain their certifications. Which of the following should be the FIRST

course of action?

Options:

A.

Evaluate the cost of maintaining the certification.


B.

Review the new standard for applicability to the business.


C.

Modify policies to ensure new requirements are covered.


D.

Communicate the new standard to senior leadership.


Expert Solution
Questions # 78:

After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:

Options:

A.

determine the potential impact.


B.

reevaluate the standards.


C.

implement compensating controls.


D.

evaluate the cost of replacing the applications.


Expert Solution
Questions # 79:

An information security manager is assessing security risk associated with a cloud service provider. Which of the following is the MOST appropriate reference to consult when performing this assessment?

Options:

A.

Previous provider service level agreements (SLAs)


B.

Security control frameworks


C.

Threat intelligence reports


D.

Penetration test results from the provider


Expert Solution
Questions # 80:

Which of the following is the BEST approach for governing noncompliance with security requirements?

Options:

A.

Base mandatory review and exception approvals on residual risk,


B.

Require users to acknowledge the acceptable use policy.


C.

Require the steering committee to review exception requests.


D.

Base mandatory review and exception approvals on inherent risk.


Expert Solution
Viewing page 4 out of 15 pages
Viewing questions 61-80 out of questions