Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 6 out of 16 pages
Viewing questions 101-120 out of questions
Questions # 101:

Which of the following should be done FIRST when implementing a security program?

Options:

A.

Perform a risk analysis


B.

Implement data encryption.


C.

Create an information asset inventory.


D.

Determine the value of information assets.


Expert Solution
Questions # 102:

What is the PRIMARY benefit to an organization that maintains an information security governance framework?

Options:

A.

Resources are prioritized to maximize return on investment (ROI)


B.

Information security guidelines are communicated across the enterprise_


C.

The organization remains compliant with regulatory requirements.


D.

Business risks are managed to an acceptable level.


Expert Solution
Questions # 103:

Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?

Options:

A.

Execution of unauthorized commands


B.

Prevention of authorized access


C.

Defacement of website content


D.

Unauthorized access to resources


Expert Solution
Questions # 104:

Which of the following is the MOST effective way to prevent information security incidents?

Options:

A.

Implementing a security information and event management (SIEM) tool


B.

Implementing a security awareness training program for employees


C.

Deploying a consistent incident response approach


D.

Deploying intrusion detection tools in the network environment


Expert Solution
Questions # 105:

Which of the following provides the BEST evidence that a recently established infofmation security program is effective?

Options:

A.

The number of reported incidents has increased


B.

Regular IT balanced scorecards are communicated.


C.

Senior management has reported fewer junk emails.


D.

The number of tickets associated with IT incidents have stayed consistent


Expert Solution
Questions # 106:

When updating the information security policy to accommodate a new regulation, the information security manager should FIRST:

Options:

A.

Review key risk indicators (KRIs)


B.

Perform a gap analysis


C.

Consult process owners


D.

Update key performance indicators (KPIs)


Expert Solution
Questions # 107:

The PRIMARY benefit of integrating information security activities into change management processes is to:

Options:

A.

protect the organization from unauthorized changes.


B.

ensure required controls are included in changes.


C.

provide greater accountability for security-related changes in the business.


D.

protect the business from collusion and compliance threats.


Expert Solution
Questions # 108:

To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?

Options:

A.

Data storage procedures


B.

Data classification policy


C.

Results of penetration testing


D.

Features of data protection products


Expert Solution
Questions # 109:

An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?

Options:

A.

Implement a SIEM solution.


B.

Perform a threat analysis.


C.

Establish performance metrics for the team.


D.

Perform a post-incident review.


Expert Solution
Questions # 110:

An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?

Options:

A.

Enforce the policy.


B.

Modify the policy.


C.

Present the risk to senior management.


D.

Create an exception for the deviation.


Expert Solution
Questions # 111:

The PRIMARY purpose for continuous monitoring of security controls is to ensure:

Options:

A.

control gaps are minimized.


B.

system availability.


C.

effectiveness of controls.


D.

alignment with compliance requirements.


Expert Solution
Questions # 112:

When taking a risk-based approach to vulnerability management, which of the following is MOST important to consider when prioritizing a vulnerability?

Options:

A.

The information available about the vulnerability


B.

The sensitivity of the asset and the data it contains


C.

IT resource availability and constraints


D.

Whether patches have been developed and tested


Expert Solution
Questions # 113:

A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?

Options:

A.

Information security manager


B.

Security policy author


C.

Creator of the document


D.

Data custodian


Expert Solution
Questions # 114:

Which of the following is MOST important to have in place for an organization's information security program to be effective?

Options:

A.

Documented information security processes


B.

A comprehensive IT strategy


C.

Senior management support


D.

Defined and allocated budget


Expert Solution
Questions # 115:

An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?

Options:

A.

Instruct IT to deploy controls based on urgent business needs.


B.

Present a business case for additional controls to senior management.


C.

Solicit bids for compensating control products.


D.

Recommend a different application.


Expert Solution
Questions # 116:

Which of the following is the GREATEST benefit resulting from the introduction of data security standards for payment cards?

Options:

A.

It helps achieve the holistic protection of information assets in the industry.


B.

It deters hackers from committing crimes related to card payments.


C.

It optimizes budget allocation for cybersecurity in each organization.


D.

It enables a wider range of more sophisticated payment methods.


Expert Solution
Questions # 117:

An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?

Options:

A.

Perform a vulnerability assessment


B.

Conduct an internal audit


C.

Conduct penetration testing


D.

Prepare compensating controls


Expert Solution
Questions # 118:

An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?

Options:

A.

Red team exercise


B.

Black box penetration test


C.

Disaster recovery exercise


D.

Tabletop exercise


Expert Solution
Questions # 119:

A global organization has outsourced security processes to a service provider by means of a global agreement. What is the MOST efficient approach to meet country-specific regulatory requirements?

Options:

A.

Include binding corporate rules into the global agreement


B.

Set up a governance organization for each country


C.

Review the agreement for each country separately


D.

Set up companion agreements for each country


Expert Solution
Questions # 120:

While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?

Options:

A.

Assign responsibility to the database administrator (DBA).


B.

Review the databases for sensitive content.


C.

Prepare a report of the databases for senior management.


D.

Assign the highest classification level to those databases.


Expert Solution
Viewing page 6 out of 16 pages
Viewing questions 101-120 out of questions