Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 9 out of 16 pages
Viewing questions 161-180 out of questions
Questions # 161:

Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?

Options:

A.

Security risk assessments


B.

Lessons learned analysis


C.

Information security audits


D.

Key performance indicators (KPIs)


Expert Solution
Questions # 162:

Which of the following should be given the HIGHEST priority during an information security post-incident review?

Options:

A.

Documenting actions taken in sufficient detail


B.

Updating key risk indicators (KRIs)


C.

Evaluating the performance of incident response team members


D.

Evaluating incident response effectiveness


Expert Solution
Questions # 163:

Which of the following would be of GREATEST assistance in determining whether to accept residual risk of a critical security system?

Options:

A.

Available annual budget


B.

Cost-benefit analysis of mitigating controls


C.

Recovery time objective (RTO)


D.

Maximum tolerable outage (MTO)


Expert Solution
Questions # 164:

Which of the following is the MOST important reason to document information security incidents that are reported across the organization?

Options:

A.

Evaluate the security posture of the organization.


B.

Identify unmitigated risk.


C.

Prevent incident recurrence.


D.

Support business investments in security.


Expert Solution
Questions # 165:

To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?

Options:

A.

Gap analysis results


B.

Level of residual risk


C.

Level of risk treatment


D.

Configuration parameters


Expert Solution
Questions # 166:

Which of the following is the PRIMARY reason to review the firewall logs when an external network-based attack is reported by the intrusion detection system (IDS)?

Options:

A.

To validate the incident


B.

To review network configurations


C.

To validate the payload signature


D.

To devise the incident response strategy


Expert Solution
Questions # 167:

An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?

Options:

A.

Implement multi-factor authentication.


B.

Increase the frequency of log monitoring and analysis.


C.

Implement a security information and event management system (SIEM),


D.

Increase the sensitivity of intrusion detection systems (IDSs).


Expert Solution
Questions # 168:

An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''

Options:

A.

Deploy mobile device management (MDM)


B.

Implement remote wipe capability.


C.

Create an acceptable use policy.


D.

Conduct a mobile device risk assessment


Expert Solution
Questions # 169:

Which of the following is the MOST important objective of post-incident review activities?

Options:

A.

Evidence collection


B.

Continuous improvement


C.

Incident triage


D.

Incident documentation


Expert Solution
Questions # 170:

Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?

Options:

A.

Ensure a plan with milestones is developed.


B.

Implement a distributed denial of service (DDoS) control.


C.

Engage the incident response team.


D.

Define new key performance indicators (KPIs).


Expert Solution
Questions # 171:

Which of the following is the MOST effective way to identify changes in an information security environment?

Options:

A.

Business impact analysis (BIA)


B.

Annual risk assessments


C.

Regular penetration testing


D.

Continuous monitoring


Expert Solution
Questions # 172:

Which of the following presents the GREATEST challenge to a large multinational organization using an automated identity and access management (1AM) system?

Options:

A.

Staff turnover rates that significantly exceed industry averages


B.

Large number of applications in the organization


C.

Inaccurate workforce data from human resources (HR)


D.

Frequent changes to user roles during employment


Expert Solution
Questions # 173:

Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?

Options:

A.

Conduct a business impact analysis (BIA).


B.

Conduct periodic awareness training.


C.

Perform a security gap analysis.


D.

Perform network penetration testing.


Expert Solution
Questions # 174:

An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?

Options:

A.

Business impact analysis (BIA)


B.

Business continuity plan (BCP)


C.

Incident response plan


D.

Disaster recovery plan (DRP)


Expert Solution
Questions # 175:

When properly implemented, secure transmission protocols protect transactions:

Options:

A.

from eavesdropping.


B.

from denial of service (DoS) attacks.


C.

on the client desktop.


D.

in the server's database.


Expert Solution
Questions # 176:

Which of the following is MOST important when responding to a major security incident?

Options:

A.

Contacting forensic investigators


B.

Following the escalation process


C.

Notifying law enforcement


D.

Identifying the indicators of compromise


Expert Solution
Questions # 177:

What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?

Options:

A.

Report the noncompliance to senior management.


B.

Assess the risk of noncompliance.


C.

Activate the incident response plan.


D.

Evaluate possible compensating controls.


Expert Solution
Questions # 178:

Prior to conducting a forensic examination, an information security manager should:

Options:

A.

boot the original hard disk on a clean system.


B.

create an image of the original data on new media.


C.

duplicate data from the backup media.


D.

shut down and relocate the server.


Expert Solution
Questions # 179:

The PRIMARY objective of a post-incident review of an information security incident is to:

Options:

A.

update the risk profile


B.

minimize impact


C.

prevent recurrence.


D.

determine the impact


Expert Solution
Questions # 180:

Which of the following will BEST enable an effective information asset classification process?

Options:

A.

Including security requirements in the classification process


B.

Analyzing audit findings


C.

Reviewing the recovery time objective (RTO) requirements of the asset


D.

Assigning ownership


Expert Solution
Viewing page 9 out of 16 pages
Viewing questions 161-180 out of questions