Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 7 out of 15 pages
Viewing questions 121-140 out of questions
Questions # 121:

Which of the following BEST indicates that an information security governance framework has been successfully implemented?

Options:

A.

The framework aligns internal and external resources.


B.

The framework aligns security processes with industry best practices.


C.

The framework aligns management and other functions within the security organization.


D.

The framework includes commercial off-the-shelf security solutions.


Expert Solution
Questions # 122:

Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?

Options:

A.

Control matrix


B.

Business impact analysis (BIA)


C.

Risk register


D.

Information security policy


Expert Solution
Questions # 123:

An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?

Options:

A.

Conduct an impact assessment.


B.

Isolate the affected systems.


C.

Rebuild the affected systems.


D.

Initiate incident response.


Expert Solution
Questions # 124:

Which of the following BEST helps to enable the desired information security culture within an organization?

Options:

A.

Information security awareness training and campaigns


B.

Effective information security policies and procedures


C.

Delegation of information security roles and responsibilities


D.

Incentives for appropriate information security-related behavior


Expert Solution
Questions # 125:

Data classification is PRIMARILY the responsibility of:

Options:

A.

senior management.


B.

the data custodian.


C.

the data owner.


D.

the security manager.


Expert Solution
Questions # 126:

An organization is MOST likely to accept the risk of noncompliance with a new regulatory requirement when:

Options:

A.

employees are resistant to the controls required by the new regulation.


B.

the regulatory requirement conflicts with business requirements.


C.

the risk of noncompliance exceeds the organization's risk appetite.


D.

the cost of complying with the regulation exceeds the potential penalties.


Expert Solution
Questions # 127:

Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?

Options:

A.

Conduct a business impact analysis (BIA)


B.

Identify the response and recovery learns.


C.

Review the communications plan.


D.

Develop response and recovery strategies.


Expert Solution
Questions # 128:

Which of the following components of an information security risk assessment is MOST valuable to senior management?

Options:

A.

Threat profile


B.

Residual risk


C.

Return on investment (ROI)


D.

Mitigation actions


Expert Solution
Questions # 129:

Which of the following is a PRIMARY benefit of managed security solutions?

Options:

A.

Wider range of capabilities


B.

Easier implementation across an organization


C.

Greater ability to focus on core business operations


D.

Lower cost of operations


Expert Solution
Questions # 130:

Which of the following is the MOST effective way to detect security incidents?

Options:

A.

Analyze recent security risk assessments.


B.

Analyze security anomalies.


C.

Analyze penetration test results.


D.

Analyze vulnerability assessments.


Expert Solution
Questions # 131:

Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?

Options:

A.

Threat analytics software


B.

Host intrusion detection system


C.

SIEM


D.

Network intrusion detection system


Expert Solution
Questions # 132:

A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?

Options:

A.

Automate user provisioning activities.


B.

Maintain strict control over user provisioning activities.


C.

Formally document IT administrator activities.


D.

Implement monitoring of IT administrator activities.


Expert Solution
Questions # 133:

Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?

Options:

A.

Decrease in the number of security incidents


B.

Increase in the frequency of security incident escalations


C.

Reduction in the impact of security incidents


D.

Increase in the number of reported security incidents


Expert Solution
Questions # 134:

An email digital signature will:

Options:

A.

protect the confidentiality of an email message.


B.

verify to recipient the integrity of an email message.


C.

automatically correct unauthorized modification of an email message.


D.

prevent unauthorized modification of an email message.


Expert Solution
Questions # 135:

Which of the following is the BEST indication of information security strategy alignment with the “&

Options:

A.

Percentage of information security incidents resolved within defined service level agreements (SLAs)


B.

Percentage of corporate budget allocated to information security initiatives


C.

Number of business executives who have attended information security awareness sessions


D.

Number of business objectives directly supported by information security initiatives


Expert Solution
Questions # 136:

A newly appointed information security manager of a retailer with multiple stores discovers an HVAC (heating, ventilation, and air conditioning) vendor has remote access to the stores to enable real-time monitoring and equipment diagnostics. Which of the following should be the information security manager's FIRST course of action?

Options:

A.

Conduct a penetration test of the vendor.


B.

Review the vendor's technical security controls


C.

Review the vendor contract


D.

Disconnect the real-time access


Expert Solution
Questions # 137:

What is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?

Options:

A.

To share responsibility for addressing security breaches


B.

To gain acceptance of the policy across the organization


C.

To decrease the workload of the IT department


D.

To reduce the overall cost of policy development


Expert Solution
Questions # 138:

The PRIMARY objective of a post-incident review of an information security incident is to:

Options:

A.

update the risk profile


B.

minimize impact


C.

prevent recurrence.


D.

determine the impact


Expert Solution
Questions # 139:

Which of the following BEST enables an organization to maintain an appropriate security control environment?

Options:

A.

Alignment to an industry security framework


B.

Budgetary support for security


C.

Periodic employee security training


D.

Monitoring of the threat landscape


Expert Solution
Questions # 140:

Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?

Options:

A.

Enterprise risk committee


B.

Information security steering committee


C.

Data privacy officer (DPO)


D.

Chief information security officer (CISO)


Expert Solution
Viewing page 7 out of 15 pages
Viewing questions 121-140 out of questions