Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 8 out of 16 pages
Viewing questions 141-160 out of questions
Questions # 141:

Which of the following is the BEST way to evaluate the effectiveness of physical and environmental security controls implemented for fire-related disasters?

Options:

A.

Conduct evacuation exercises


B.

Review the disaster recovery plan (DRP)


C.

Conduct awareness sessions


D.

Review emergency management team procedures


Expert Solution
Questions # 142:

Which or the following is MOST important to consider when determining backup frequency?

Options:

A.

Recovery point objective (RPO)


B.

Recovery time objective (RTO)


C.

Allowable interruption window


D.

Maximum tolerable outage (MTO)


Expert Solution
Questions # 143:

Which of the following events is MOST likely to require an organization to revisit its information security framework?

Options:

A.

New services offered by IT


B.

Changes to the risk landscape


C.

A recent cybersecurity attack


D.

A new technology implemented


Expert Solution
Questions # 144:

A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:

Options:

A.

developing a security program that meets global and regional requirements.


B.

ensuring effective communication with local regulatory bodies.


C.

using industry best practice to meet local legal regulatory requirements.


D.

monitoring compliance with defined security policies and standards.


Expert Solution
Questions # 145:

The PRIMARY purpose of vulnerability identification is to:

Options:

A.

Remediate vulnerabilities before they are exploited


B.

Discover control deficiencies


C.

Provide vulnerability identifiers for risk reporting


D.

Prioritize vulnerability remediation


Expert Solution
Questions # 146:

An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?

Options:

A.

Scan the entire application using a vulnerability scanning tool.


B.

Run the application from a high-privileged account on a test system.


C.

Perform security code reviews on the entire application.


D.

Monitor Internet traffic for sensitive information leakage.


Expert Solution
Questions # 147:

Which of the following should be the PRIMARY focus of a status report on the information security program to senior management?

Options:

A.

Providing evidence that resources are performing as expected


B.

Verifying security costs do not exceed the budget


C.

Demonstrating risk is managed at the desired level


D.

Confirming the organization complies with security policies


Expert Solution
Questions # 148:

Which of the following is MOST important to ensure incident management readiness?

Options:

A.

The plan is compliant with industry standards.


B.

The plan is regularly tested.


C.

The plan is updated annually.


D.

The plan is concise and includes a checklist.


Expert Solution
Questions # 149:

Which of the following BEST informs the design of an information security framework?

Options:

A.

Recent audit findings


B.

Implementation cost


C.

Risk appetite


D.

Available skills


Expert Solution
Questions # 150:

An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?

Options:

A.

Conduct an information security audit.


B.

Validate the relevance of the information.


C.

Perform a gap analysis.


D.

Inform senior management


Expert Solution
Questions # 151:

Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?

Options:

A.

Industry benchmarks


B.

Security training test results


C.

Performance measures for existing controls


D.

Number of false positives


Expert Solution
Questions # 152:

Which of the following is ESSENTIAL to ensuring effective incident response?

Options:

A.

Business continuity plan (BCP)


B.

Cost-benefit analysis


C.

Classification scheme


D.

Senior management support


Expert Solution
Questions # 153:

Which of the following factors would have the MOST significant impact on an organization's information security governance mode?

Options:

A.

Outsourced processes


B.

Security budget


C.

Number of employees


D.

Corporate culture


Expert Solution
Questions # 154:

An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?

Options:

A.

Conduct an internal audit.


B.

Conduct penetration testing.


C.

Perform a vulnerability assessment.


D.

Prepare compensating controls.


Expert Solution
Questions # 155:

Which of the following is the FIRST step in developing a business continuity plan (BCP)?

Options:

A.

Determine the business recovery strategy


B.

Determine available resources.


C.

Identify the applications with the shortest recovery time objectives (RTOs).


D.

Identify critical business processes.


Expert Solution
Questions # 156:

Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?

Options:

A.

A capability and maturity assessment


B.

Detailed analysis of security program KPIs


C.

An information security dashboard


D.

An information security risk register


Expert Solution
Questions # 157:

Which of the following is MOST important for the effective implementation of an information security governance program?

Options:

A.

Employees receive customized information security training


B.

The program budget is approved and monitored by senior management


C.

The program goals are communicated and understood by the organization.


D.

Information security roles and responsibilities are documented.


Expert Solution
Questions # 158:

When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:

Options:

A.

the integrity of evidence is preserved.


B.

forensic investigation software is loaded on the server.


C.

the incident is reported to senior management.


D.

the server is unplugged from power.


Expert Solution
Questions # 159:

Which of the following is the BEST approach to make strategic information security decisions?

Options:

A.

Establish regular information security status reporting.


B.

Establish an information security steering committee.


C.

Establish business unit security working groups.


D.

Establish periodic senior management meetings.


Expert Solution
Questions # 160:

What should be an information security manager's MOST important consideration when developing a multi-year plan?

Options:

A.

Ensuring contingency plans are in place for potential information security risks


B.

Ensuring alignment with the plans of other business units


C.

Allowing the information security program to expand its capabilities


D.

Demonstrating projected budget increases year after year


Expert Solution
Viewing page 8 out of 16 pages
Viewing questions 141-160 out of questions