Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 5 out of 16 pages
Viewing questions 81-100 out of questions
Questions # 81:

Which of the following is the BEST control to protect customer personal information that is stored in the cloud?

Options:

A.

Timely deletion of digital records


B.

Appropriate data anonymization


C.

Strong encryption methods


D.

Strong physical access controls


Expert Solution
Questions # 82:

An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?

Options:

A.

Conduct a risk assessment and share the result with senior management.


B.

Revise the incident response plan-to align with business processes.


C.

Provide incident response training to data custodians.


D.

Provide incident response training to data owners.


Expert Solution
Questions # 83:

Which of the following change management procedures is MOST likely to cause concern to the information security manager?

Options:

A.

Fallback processes are tested the weekend before changes are made


B.

Users are not notified of scheduled system changes


C.

A manual rather than an automated process is used to compare program versions.


D.

The development manager migrates programs into production


Expert Solution
Questions # 84:

Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?

Options:

A.

Threat management is enhanced.


B.

Compliance status is improved.


C.

Security metrics are enhanced.


D.

Proactive risk management is facilitated.


Expert Solution
Questions # 85:

When is the BEST time to verify that a production system's security mechanisms meet control objectives?

Options:

A.

During quality and acceptance checks


B.

On a continuous basis through monitoring activities and automated tooling


C.

After remediations recommended by penetration tests have been completed


D.

During annual internal and compliance audits


Expert Solution
Questions # 86:

During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?

Options:

A.

The certification includes industry-recognized security controls.


B.

The certification was issued within the last five years.


C.

The certification is issued for the specific scope.


D.

The certification is easily verified.


Expert Solution
Questions # 87:

An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?

Options:

A.

Focus the review on the infrastructure with the highest risk


B.

Review controls listed in the vendor contract


C.

Determine whether the vendor follows the selected security framework rules


D.

Review the vendor's security policy


Expert Solution
Questions # 88:

Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?

Options:

A.

Revisit the business objective.


B.

Escalate to senior management.


C.

Perform a cost-benefit analysis.


D.

Recommend risk acceptance.


Expert Solution
Questions # 89:

Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?

Options:

A.

Enterprise risk committee


B.

Information security steering committee


C.

Data privacy officer (DPO)


D.

Chief information security officer (CISO)


Expert Solution
Questions # 90:

Which of the following BEST indicates that information security governance and corporate governance are integrated?

Options:

A.

The information security team is aware of business goals.


B.

The board is regularly informed of information security key performance indicators (KPIs),


C.

The information security steering committee is composed of business leaders.


D.

A cost-benefit analysis is conducted on all information security initiatives.


Expert Solution
Questions # 91:

Which of the following is the BEST method to ensure compliance with password standards?

Options:

A.

Implementing password-synchronization software


B.

Using password-cracking software


C.

Automated enforcement of password syntax rules


D.

A user-awareness program


Expert Solution
Questions # 92:

Which of the following would BEST enable the timely execution of an incident response plan?

Options:

A.

The introduction of a decision support tool


B.

Definition of trigger events


C.

Clearly defined data classification process


D.

Centralized service desk


Expert Solution
Questions # 93:

Which of the following is the GREATEST benefit of classifying information security incidents?

Options:

A.

Reporting capabilities


B.

Improved chain of custody


C.

Comprehensive documentation


D.

Prioritized recovery


Expert Solution
Questions # 94:

The PRIMARY consideration when responding to a ransomware attack should be to ensure:

Options:

A.

backups are available.


B.

the most recent patches have been applied.


C.

the ransomware attack is contained


D.

the business can operate


Expert Solution
Questions # 95:

When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security incident is that it helps to:

Options:

A.

the incident response process to stakeholders


B.

adequately staff and train incident response teams.


C.

develop effective escalation and response procedures.


D.

make tabletop testing more effective.


Expert Solution
Questions # 96:

Which of the following is the BEST indication of an effective disaster recovery planning process?

Options:

A.

Hot sites are required for any declared disaster.


B.

Chain of custody is maintained throughout the disaster recovery process.


C.

Post-incident reviews are conducted after each event.


D.

Recovery time objectives (RTOs) are shorter than recovery point objectives (RPOs).


Expert Solution
Questions # 97:

Which of the following should be the FIRST step when performing triage of a malware incident?

Options:

A.

Containing the affected system


B.

Preserving the forensic image


C.

Comparing backup against production


D.

Removing the malware


Expert Solution
Questions # 98:

Which is MOST important to identify when developing an effective information security strategy?

Options:

A.

Security awareness training needs


B.

Potential savings resulting from security governance


C.

Business assets to be secured


D.

Residual risk levels


Expert Solution
Questions # 99:

When deciding to move to a cloud-based model, the FIRST consideration should be:

Options:

A.

storage in a shared environment.


B.

availability of the data.


C.

data classification.


D.

physical location of the data.


Expert Solution
Questions # 100:

Which of the following is the MOST important reason to consider organizational culture when developing an information security program?

Options:

A.

Everyone in the organization is responsible for information security.


B.

It helps expedite approval for the information security budget.


C.

It helps the organization meet compliance requirements.


D.

Security incidents have an adverse impact on the entire organization.


Expert Solution
Viewing page 5 out of 16 pages
Viewing questions 81-100 out of questions