Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 5 out of 15 pages
Viewing questions 81-100 out of questions
Questions # 81:

Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?

Options:

A.

Establishing risk metrics


B.

Training on risk management procedures


C.

Reporting on documented deficiencies


D.

Assigning a risk owner


Expert Solution
Questions # 82:

Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?

Options:

A.

Regulatory requirements


B.

Compliance acceptance


C.

Management support


D.

Budgetary approval


Expert Solution
Questions # 83:

Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?

Options:

A.

Projected Increase in maturity level


B.

Estimated reduction in risk


C.

Projected costs over time


D.

Estimated increase in efficiency


Expert Solution
Questions # 84:

Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?

Options:

A.

Focus on addressing conflicts between security and performance.


B.

Collaborate with business and IT functions in determining controls.


C.

Include information security requirements in the change control process.


D.

Obtain assistance from IT to implement automated security cantrals.


Expert Solution
Questions # 85:

Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?

Options:

A.

Alive demonstration of the third-party supplier's security capabilities


B.

The ability to i third-party supplier's IT systems and processes


C.

Third-party security control self-assessment (CSA) results


D.

An independent review report indicating compliance with industry standards


Expert Solution
Questions # 86:

Who should be responsible for determining the level of data classification required for an application related to a new line of business?

Options:

A.

Data analyst


B.

Information security officer (ISO)


C.

Data custodian


D.

Data owners


Expert Solution
Questions # 87:

A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?

Options:

A.

Provide end-user training.


B.

Escalate to senior management.


C.

Continue to enforce the policy.


D.

Conduct a business impact analysis (BIA).


Expert Solution
Questions # 88:

During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?

Options:

A.

The certification includes industry-recognized security controls.


B.

The certification was issued within the last five years.


C.

The certification is issued for the specific scope.


D.

The certification is easily verified.


Expert Solution
Questions # 89:

Which of the following should be the PRIMARY objective of an information security governance framework?

Options:

A.

Provide a baseline for optimizing the security profile of the organization.


B.

Demonstrate senior management commitment.


C.

Demonstrate compliance with industry best practices to external stakeholders.


D.

Ensure that users comply with the organization's information security policies.


Expert Solution
Questions # 90:

Which of the following is the PRIMARY reason to assign a risk owner in an organization?

Options:

A.

To remediate residual risk


B.

To define responsibilities


C.

To ensure accountability


D.

To identify emerging risk


Expert Solution
Questions # 91:

An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:

Options:

A.

a directory of approved local media contacts


B.

pre-prepared media statements


C.

procedures to contact law enforcement


D.

a single point of contact within the organization


Expert Solution
Questions # 92:

An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?

Options:

A.

Data masking


B.

Data retention strategy


C.

Data encryption standards


D.

Data loss prevention (DLP)


Expert Solution
Questions # 93:

Which of the following would be of GREATEST assistance in determining whether to accept residual risk of a critical security system?

Options:

A.

Available annual budget


B.

Cost-benefit analysis of mitigating controls


C.

Recovery time objective (RTO)


D.

Maximum tolerable outage (MTO)


Expert Solution
Questions # 94:

An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?

Options:

A.

Feedback from the vendor's previous clients


B.

Alignment of the vendor's business objectives with enterprise security goals


C.

The maturity of the vendor's internal control environment


D.

Penetration testing against the vendor's network


Expert Solution
Questions # 95:

A new risk has been identified in a high availability system. The BEST course of action is to:

Options:

A.

Perform a cost-benefit analysis for mitigating controls


B.

Recommend risk acceptance to the business owner


C.

Develop and implement a plan to mitigate the identified risk


D.

Evaluate and prioritize the identified risk


Expert Solution
Questions # 96:

Which of the following is MOST difficult to measure following an information security breach?

Options:

A.

Reputational damage


B.

Human resource costs


C.

Regulatory sanctions


D.

Replacement efforts


Expert Solution
Questions # 97:

Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?

Options:

A.

Metrics to drive the information security program


B.

Information security policies


C.

A defined security organizational structure


D.

An information security strategy


Expert Solution
Questions # 98:

A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?

Options:

A.

Invoke the incident response plan


B.

Implement role-based access control (RBAC)


C.

Remove access to the information


D.

Delete the information from the file server


Expert Solution
Questions # 99:

Which of the following is a PRIMARY responsibility of the information security goxernance function?

Options:

A.

Administering information security awareness training


B.

Defining security strategies to support organizational programs


C.

Ensuring adequate support for solutions using emerging technologies


D.

Advising senior management on optimal levels of risk appetite and tolerance


Expert Solution
Questions # 100:

Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?

Options:

A.

Perform a risk analysis for critical applications.


B.

Determine whether critical success factors (CSFs) have been defined.


C.

Conduct a capability maturity model evaluation.


D.

Review and update current operational procedures.


Expert Solution
Viewing page 5 out of 15 pages
Viewing questions 81-100 out of questions