Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 6 out of 15 pages
Viewing questions 101-120 out of questions
Questions # 101:

An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?

Options:

A.

Implementing automated vulnerability scanning in the help desk workflow


B.

Changing the default setting for all security incidents to the highest priority


C.

Integrating automated service level agreement (SLA) reporting into the help desk ticketing system


D.

Integrating incident response workflow into the help desk ticketing system


Expert Solution
Questions # 102:

Which of the following should be the PRIMARY consideration when developing an incident response plan?

Options:

A.

The definition of an incident


B.

Compliance with regulations


C.

Management support


D.

Previously reported incidents


Expert Solution
Questions # 103:

Which of the following is the MOST effective way to identify changes in an information security environment?

Options:

A.

Business impact analysis (BIA)


B.

Annual risk assessments


C.

Regular penetration testing


D.

Continuous monitoring


Expert Solution
Questions # 104:

Detailed business continuity plans (BCPs) should be PRIMARILY based on:

Options:

A.

strategies validated by senior management.


B.

capabilities of available local vendors.


C.

strategies that cover all applications.


D.

cost and resources needed to execute.


Expert Solution
Questions # 105:

Which of the following is the MOST important input to the development of an effective information security strategy?

Options:

A.

Risk and business impact assessments


B.

Business processes and requirements


C.

Current and desired state of security


D.

Well-defined security policies and procedures


Expert Solution
Questions # 106:

Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?

Options:

A.

Enhanced security monitoring and reporting


B.

Reduced control complexity


C.

Enhanced threat detection capability


D.

Reduction of organizational risk


Expert Solution
Questions # 107:

In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?

Options:

A.

Access to the hardware


B.

Data encryption


C.

Non-standard event logs


D.

Compressed customer data


Expert Solution
Questions # 108:

An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?

Options:

A.

IT strategy


B.

Security architecture


C.

Business case


D.

Risk assessment


Expert Solution
Questions # 109:

Which of the following will BEST facilitate timely and effective incident response?

Options:

A.

Including penetration test results in incident response planning


B.

Assessing the risk of compromised assets


C.

Classifying the severity of an incident


D.

Notifying stakeholders when invoking the incident response plan


Expert Solution
Questions # 110:

Which of the following BEST supports information security management in the event of organizational changes in security personnel?

Options:

A.

Formalizing a security strategy and program


B.

Developing an awareness program for staff


C.

Ensuring current documentation of security processes


D.

Establishing processes within the security operations team


Expert Solution
Questions # 111:

Which of the following is the MOST critical input to developing policies, standards, and procedures to secure information assets?

Options:

A.

Vulnerability assessment


B.

Regulatory requirements


C.

Industry best practices


D.

Enterprise goals


Expert Solution
Questions # 112:

When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?

Options:

A.

Business process owner


B.

Business continuity coordinator


C.

Senior management


D.

Information security manager


Expert Solution
Questions # 113:

Which of the following should be the FIRST consideration when developing a strategy for protecting an organization's data?

Options:

A.

Classification


B.

Encryption


C.

Access monitoring


D.

Access rights


Expert Solution
Questions # 114:

A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:

Options:

A.

developing a security program that meets global and regional requirements.


B.

ensuring effective communication with local regulatory bodies.


C.

using industry best practice to meet local legal regulatory requirements.


D.

monitoring compliance with defined security policies and standards.


Expert Solution
Questions # 115:

Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?

Options:

A.

Define policies and standards for data processing.


B.

Implement applicable privacy principles


C.

Assess local or regional regulations


D.

Research cyber insurance policies


Expert Solution
Questions # 116:

An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?

Options:

A.

Instruct IT to deploy controls based on urgent business needs.


B.

Present a business case for additional controls to senior management.


C.

Solicit bids for compensating control products.


D.

Recommend a different application.


Expert Solution
Questions # 117:

An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?

Options:

A.

File integrity monitoring software


B.

Security information and event management (SIEM) tool


C.

Antivirus software


D.

Intrusion detection system (IDS)


Expert Solution
Questions # 118:

Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?

Options:

A.

Ensure a plan with milestones is developed.


B.

Implement a distributed denial of service (DDoS) control.


C.

Engage the incident response team.


D.

Define new key performance indicators (KPIs).


Expert Solution
Questions # 119:

Which of the following is the BEST course of action when an online company discovers a network attack in progress?

Options:

A.

Dump all event logs to removable media


B.

Isolate the affected network segment


C.

Enable trace logging on ail events


D.

Shut off all network access points


Expert Solution
Questions # 120:

Which of the following is the MOST important factor of a successful information security program?

Options:

A.

The program follows industry best practices.


B.

The program is based on a well-developed strategy.


C.

The program is cost-efficient and within budget,


D.

The program is focused on risk management.


Expert Solution
Viewing page 6 out of 15 pages
Viewing questions 101-120 out of questions