Pass the Isaca Isaca Certification CISM Questions and answers with CertsForce

Viewing page 9 out of 15 pages
Viewing questions 161-180 out of questions
Questions # 161:

Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?

Options:

A.

Update the vendor risk assessment.


B.

Engage legal counsel.


C.

Renegotiate the vendor contract.


D.

Terminate the relationship with the vendor.


Expert Solution
Questions # 162:

Which of the following BEST enables an organization to effectively manage emerging cyber risk?

Options:

A.

Periodic internal and external audits


B.

Clear lines of responsibility


C.

Sufficient cyber budget allocation


D.

Cybersecurity policies


Expert Solution
Questions # 163:

Which of the following is MOST relevant for an information security manager to communicate to the board of directors?

Options:

A.

The level of inherent risk


B.

Vulnerability assessments


C.

The level of exposure


D.

Threat assessments


Expert Solution
Questions # 164:

An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?

Options:

A.

Perform a gap analysis.


B.

Consult with senior management on the best course of action.


C.

Implement a program of work to comply with the new legislation.


D.

Understand the cost of noncompliance.


Expert Solution
Questions # 165:

In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:

Options:

A.

change activities are documented.


B.

the rationale for acceptance is periodically reviewed.


C.

the acceptance is aligned with business strategy.


D.

compliance with the risk acceptance framework.


Expert Solution
Questions # 166:

Information security policies should PRIMARILY reflect alignment with:

Options:

A.

an information security framework.


B.

industry best practices.


C.

data security standards.


D.

senior management intent.


Expert Solution
Questions # 167:

Which of the following would BEST help to ensure appropriate security controls are built into software?

Options:

A.

Integrating security throughout the development process


B.

Performing security testing prior to deployment


C.

Providing standards for implementation during development activities


D.

Providing security training to the software development team


Expert Solution
Questions # 168:

Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?

Options:

A.

Number of blocked intrusion attempts


B.

Number of business cases reviewed by senior management


C.

Trends in the number of identified threats to the business


D.

Percentage of controls integrated into business processes


Expert Solution
Questions # 169:

An information security policy was amended recently to support an organization's new information security strategy. Which of the following should be the information security manager's NEXT step?

Options:

A.

Evaluate the alignment with business strategy.


B.

Review technical controls.


C.

Update standards and procedures.


D.

Refresh the security training program.


Expert Solution
Questions # 170:

Which of the following is the PRIMARY advantage of an organization using Disaster Recovery as a Service (DRaaS) to help manage its disaster recovery program?

Options:

A.

It offers the organization flexible deployment options using cloud infrastructure.


B.

It allows the organization to prioritize its core operations.


C.

It is more secure than traditional data backup architecture.


D.

It allows the use of a professional response team at a lower cost.


Expert Solution
Questions # 171:

Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?

Options:

A.

Protection of business value and assets


B.

Identification of core business strategiesC, Easier entrance into new businesses and technologies


C.

Improved regulatory compliance posture


Expert Solution
Questions # 172:

Which of the following processes is MOST important for the success of a business continuity plan (BCP)?

Options:

A.

Involving all stakeholders in testing and training


B.

Scheduling periodic internal and external audits


C.

Including the board and senior management in plan reviews


D.

Maintaining copies of the plan at the primary and recovery sites


Expert Solution
Questions # 173:

Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?

Options:

A.

Recovery


B.

Identification


C.

Containment


D.

Preparation


Expert Solution
Questions # 174:

Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?

Options:

A.

Execution of unauthorized commands


B.

Prevention of authorized access


C.

Defacement of website content


D.

Unauthorized access to resources


Expert Solution
Questions # 175:

Which of the following is the PRIMARY objective of information asset classification?

Options:

A.

Vulnerability reduction


B.

Compliance management


C.

Risk management


D.

Threat minimization


Expert Solution
Questions # 176:

Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?

Options:

A.

Security policy


B.

Risk management framework


C.

Risk appetite


D.

Security standards


Expert Solution
Questions # 177:

Which of the following provides the BEST input to determine the level of protection needed for an IT system?

Options:

A.

Vulnerability assessment


B.

Asset classification


C.

Threat analysis


D.

Internal audit findings


Expert Solution
Questions # 178:

When determining an acceptable risk level which of the following is the MOST important consideration?

Options:

A.

Threat profiles


B.

System criticalities


C.

Vulnerability scores


D.

Risk matrices


Expert Solution
Questions # 179:

When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?

Options:

A.

The information security strategy


B.

Losses due to security incidents


C.

The results of a risk assessment


D.

Security investment trends in the industry


Expert Solution
Questions # 180:

After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?

Options:

A.

EradicationB Recovery


B.

Lessons learned review


C.

Incident declaration


Expert Solution
Viewing page 9 out of 15 pages
Viewing questions 161-180 out of questions