Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 8 out of 15 pages
Viewing questions 141-160 out of questions
Questions # 141:

Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?

Options:

A.

Heightened awareness of information security strategies


B.

Improved process resiliency in the event of attacks


C.

Promotion of security-by-design principles to the business


D.

Management accountability for information security


Expert Solution
Questions # 142:

In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?

Options:

A.

Revise the policy.


B.

Perform a root cause analysis.


C.

Conduct a risk assessment,


D.

Communicate the acceptable use policy.


Expert Solution
Questions # 143:

The PRIMARY purpose for continuous monitoring of security controls is to ensure:

Options:

A.

control gaps are minimized.


B.

system availability.


C.

effectiveness of controls.


D.

alignment with compliance requirements.


Expert Solution
Questions # 144:

An organization has remediated a security flaw in a system. Which of the following should be done NEXT?

Options:

A.

Assess the residual risk.


B.

Share lessons learned with the organization.


C.

Update the system's documentation.


D.

Allocate budget for penetration testing.


Expert Solution
Questions # 145:

An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?

Options:

A.

Preventive


B.

Corrective


C.

Detective


D.

Deterrent


Expert Solution
Questions # 146:

An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?

Options:

A.

Identification of risk


B.

Analysis of control gaps


C.

Design of key risk indicators (KRIs)


D.

Selection of risk treatment options


Expert Solution
Questions # 147:

An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?

Options:

A.

Reinforce security awareness practices for end users.


B.

Temporarily outsource the email system to a cloud provider.


C.

Develop a business case to replace the system.


D.

Monitor outgoing traffic on the firewall.


Expert Solution
Questions # 148:

An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?

Options:

A.

Establish an organization-wide social media policy.


B.

Develop sanctions for misuse of social media sites.


C.

Monitor social media sites visited by employees.


D.

Restrict social media access on corporate devices.


Expert Solution
Questions # 149:

A business impact analysis (BIA) BEST enables an organization to establish:

Options:

A.

annualized loss expectancy (ALE).


B.

recovery methods.


C.

total cost of ownership (TCO).


D.

restoration priorities.


Expert Solution
Questions # 150:

An organization is aligning its incident response capability with a public cloud service provider. What should be the information security manager's FIRST course of action?

Options:

A.

Identify the skill set of the provider's incident response team.


B.

Evaluate the provider's audit logging and monitoring controls.


C.

Review the provider’s incident definitions and notification criteria.


D.

Update the incident escalation process.


Expert Solution
Questions # 151:

Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?

Options:

A.

Communicate disciplinary processes for policy violations.


B.

Require staff to participate in information security awareness training.


C.

Require staff to sign confidentiality agreements.


D.

Include information security responsibilities in job descriptions.


Expert Solution
Questions # 152:

When deciding to move to a cloud-based model, the FIRST consideration should be:

Options:

A.

storage in a shared environment.


B.

availability of the data.


C.

data classification.


D.

physical location of the data.


Expert Solution
Questions # 153:

Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?

Options:

A.

Clearer segregation of duties


B.

Increased user productivity


C.

Increased accountability


D.

Fewer security incidents


Expert Solution
Questions # 154:

Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?

Options:

A.

Data privacy officer


B.

Information security manager


C.

Head of IT department


D.

Head of human resources (HR)


Expert Solution
Questions # 155:

Which of the following is the BEST course of action when using a web application that has known vulnerabilities?

Options:

A.

Monitor application level logs.


B.

Deploy host-based intrusion detection.


C.

Deploy an application firewall.


D.

Install anti-spyware software.


Expert Solution
Questions # 156:

Which of the following BEST enables the assignment of risk and control ownership?

Options:

A.

Aligning to an industry-recognized control framework


B.

Adopting a risk management framework


C.

Obtaining senior management buy-in


D.

Developing an information security strategy


Expert Solution
Questions # 157:

Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?

Options:

A.

To ensure separation of duties is maintained


B.

To ensure system audit trails are not bypassed


C.

To prevent accountability issues


D.

To prevent unauthorized user access


Expert Solution
Questions # 158:

Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?

Options:

A.

Cost of the attack to the organization


B.

Location of the attacker


C.

Method of operation used by the attacker


D.

Details from intrusion detection system (IDS) logs


Expert Solution
Questions # 159:

Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of

confidentiality?

Options:

A.

Ensuring hashing of administrator credentials


B.

Enforcing service level agreements (SLAs)


C.

Ensuring encryption for data in transit


D.

Utilizing a formal change management process


Expert Solution
Questions # 160:

Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?

Options:

A.

Determine the final root cause of the incident.


B.

Remove all instances of the incident from the network.


C.

Mitigate exploited vulnerabilities to prevent future incidents.


D.

Isolate affected systems to prevent the spread of damage.


Expert Solution
Viewing page 8 out of 15 pages
Viewing questions 141-160 out of questions