Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 7 out of 16 pages
Viewing questions 121-140 out of questions
Questions # 121:

Recommendations for enterprise investment in security technology should be PRIMARILY based on:

Options:

A.

adherence to international standards


B.

availability of financial resources


C.

the organization s risk tolerance


D.

alignment with business needs


Expert Solution
Questions # 122:

Which of the following is MOST appropriate to communicate to senior management regarding information risk?

Options:

A.

Emerging security technologies


B.

Risk profile changes


C.

Defined risk appetite


D.

Vulnerability scanning progress


Expert Solution
Questions # 123:

An organization faces severe fines and penalties if not in compliance with local regulatory requirements by an established deadline. Senior management has asked the information security manager to prepare an action plan to achieve compliance.

Which of the following would provide the MOST useful information for planning purposes? »

Options:

A.

Results from a business impact analysis (BIA)


B.

Deadlines and penalties for noncompliance


C.

Results from a gap analysis


D.

An inventory of security controls currently in place


Expert Solution
Questions # 124:

Which of the following BEST facilitates effective strategic alignment of security initiatives?

Options:

A.

The business strategy is periodically updated


B.

Procedures and standards are approved by department heads.


C.

Periodic security audits are conducted by a third-party.


D.

Organizational units contribute to and agree on priorities


Expert Solution
Questions # 125:

An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:

Options:

A.

the security organization structure.


B.

international security standards.


C.

risk assessment results.


D.

the most stringent requirements.


Expert Solution
Questions # 126:

The PRIMARY advantage of single sign-on (SSO) is that it will:

Options:

A.

increase efficiency of access management


B.

increase the security of related applications.


C.

strengthen user passwords.


D.

support multiple authentication mechanisms.


Expert Solution
Questions # 127:

An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?

Options:

A.

Initiate incident response.


B.

Disable remote


C.

Initiate a device reset.


D.

Conduct a risk assessment.


Expert Solution
Questions # 128:

Which of the following should an information security manager do FIRST when developing an organization's disaster recovery plan (DRP)?

Options:

A.

Conduct a risk assessment.


B.

Document disaster recovery procedures.


C.

Identify business requirements.


D.

Perform a business impact analysis (BIA).


Expert Solution
Questions # 129:

Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?

Options:

A.

Defining information stewardship roles


B.

Defining security asset categorization


C.

Assigning information asset ownership


D.

Developing a records retention schedule


Expert Solution
Questions # 130:

Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?

Options:

A.

Requiring challenge/response information


B.

Requiring multi factor authentication


C.

Enforcing frequent password changes


D.

Enforcing complex password formats


Expert Solution
Questions # 131:

Which of the following is MOST effective in gaining support for the information security strategy from senior management?

Options:

A.

Business impact analysis (BIA) results


B.

A major breach at a competitor


C.

Third-party security audit results


D.

Cost-benefit analysis results


Expert Solution
Questions # 132:

What is the role of the information security manager in finalizing contract negotiations with service providers?

Options:

A.

To perform a risk analysis on the outsourcing process


B.

To obtain a security standard certification from the provider


C.

To update security standards for the outsourced process


D.

To ensure that clauses for periodic audits are included


Expert Solution
Questions # 133:

Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?

Options:

A.

Conduct a business impact analysis (BIA)


B.

Identify the response and recovery learns.


C.

Review the communications plan.


D.

Develop response and recovery strategies.


Expert Solution
Questions # 134:

Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?

Options:

A.

Heightened awareness of information security strategies


B.

Improved process resiliency in the event of attacks


C.

Promotion of security-by-design principles to the business


D.

Management accountability for information security


Expert Solution
Questions # 135:

When establishing metrics for an information security program, the BEST approach is to identify indicators that:

Options:

A.

reduce information security program spending.


B.

support major information security initiatives.


C.

reflect the corporate risk culture.


D.

demonstrate the effectiveness of the security program.


Expert Solution
Questions # 136:

Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?

Options:

A.

Mapping the risks to the security classification scheme


B.

Illustrating risk on a heat map


C.

Mapping the risks to existing controls


D.

Providing a technical risk assessment report


Expert Solution
Questions # 137:

Which of the following BEST indicates that an information security governance framework has been successfully implemented?

Options:

A.

The framework aligns internal and external resources.


B.

The framework aligns security processes with industry best practices.


C.

The framework aligns management and other functions within the security organization.


D.

The framework includes commercial off-the-shelf security solutions.


Expert Solution
Questions # 138:

Reevaluation of risk is MOST critical when there is:

Options:

A.

resistance to the implementation of mitigating controls.


B.

a management request for updated security reports.


C.

a change in security policy.


D.

a change in the threat landscape.


Expert Solution
Questions # 139:

When developing a categorization method for security incidents, the categories MUST:

Options:

A.

align with industry standards.


B.

be created by the incident handler.


C.

have agreed-upon definitions.


D.

align with reporting requirements.


Expert Solution
Questions # 140:

Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?

Options:

A.

Lack of knowledgeable personnel


B.

Lack of communication processes


C.

Lack of process documentation


D.

Lack of alignment with organizational goals


Expert Solution
Viewing page 7 out of 16 pages
Viewing questions 121-140 out of questions