Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CISM Practice Exam with Questions & Answers | Set: 11

Questions 201

Which of the following components of an information security risk assessment is MOST valuable to senior management?

Options:
A.

Threat profile

B.

Residual risk

C.

Return on investment (ROI)

D.

Mitigation actions

Isaca CISM Premium Access
Questions 202

Which of the following BEST enables an organization to identify and contain security incidents?

Options:
A.

Risk assessments

B.

Threat modeling

C.

Continuous monitoring

D.

Tabletop exercises

Questions 203

Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?

Options:
A.

Senior management

B.

Application owner

C.

Information security manager

D.

Legal representative

Questions 204

Management decisions concerning information security investments will be MOST effective when they are based on:

Options:
A.

a process for identifying and analyzing threats and vulnerabilities.

B.

an annual loss expectancy (ALE) determined from the history of security events,

C.

the reporting of consistent and periodic assessments of risks.

D.

the formalized acceptance of risk analysis by management,

Questions 205

When developing an incident escalation process, the BEST approach is to classify incidents based on:

Options:
A.

estimated time to recover.

B.

information assets affected.

C.

recovery point objectives (RPOs).

D.

their root causes.

Questions 206

Which of the following is the BEST course of action for an information security manager to align security and business goals?

Options:
A.

Conducting a business impact analysis (BIA)

B.

Reviewing the business strategy

C.

Defining key performance indicators (KPIs)

D.

Actively engaging with stakeholders

Questions 207

Which of the following is the MOST critical factor for information security program success?

Options:
A.

comprehensive risk assessment program for information security

B.

The information security manager's knowledge of the business

C.

Security staff with appropriate training and adequate resources

D.

Ongoing audits and addressing open items

Questions 208

Which of the following is the MOST common cause of cybersecurity breaches?

Options:
A.

Lack of adequate password rotation

B.

Human error

C.

Abuse of privileged accounts

D.

Lack of control baselines

Questions 209

Which of the following is the BEST source of information to support an organization's information security vision and strategy?

Options:
A.

Metrics dashboard

B.

Governance policies

C.

Capability maturity model

D.

Enterprise information security architecture

Questions 210

An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.

Which of the following should be given immediate focus?

Options:
A.

Moving to a zero trust access model

B.

Enabling network-level authentication

C.

Enhancing cyber response capability

D.

Strengthening endpoint security

Questions 211

Which of the following is MOST important when defining how an information security budget should be allocated?

Options:
A.

Regulatory compliance standards

B.

Information security strategy

C.

Information security policy

D.

Business impact assessment

Questions 212

An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?

Options:
A.

Block network access until security awareness training is complete.

B.

Conduct an enterprise cybersecurity risk assessment.

C.

Obtain key stakeholder and leadership support.

D.

Send an email mandating training for the employees.

Questions 213

Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?

Options:
A.

Verify that information security requirements are included in the contract.

B.

Request customer references from the vendor.

C.

Require vendors to complete information security questionnaires.

D.

Review the results of the vendor's independent control reports.

Questions 214

In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?

Options:
A.

Revise the policy.

B.

Perform a root cause analysis.

C.

Conduct a risk assessment,

D.

Communicate the acceptable use policy.

Questions 215

When assigning a risk owner, the MOST important consideration is to ensure the owner has:

Options:
A.

adequate knowledge of risk treatment and related control activities.

B.

decision-making authority and the ability to allocate resources for risk.

C.

sufficient time for monitoring and managing the risk effectively.

D.

risk communication and reporting skills to enable decision-making.

Questions 216

Which of the following presents the GREATEST challenge to a large multinational organization using an automated identity and access management (1AM) system?

Options:
A.

Staff turnover rates that significantly exceed industry averages

B.

Large number of applications in the organization

C.

Inaccurate workforce data from human resources (HR)

D.

Frequent changes to user roles during employment

Questions 217

Detailed business continuity plans (BCPs) should be PRIMARILY based on:

Options:
A.

strategies validated by senior management.

B.

capabilities of available local vendors.

C.

strategies that cover all applications.

D.

cost and resources needed to execute.

Questions 218

The PRIMARY objective of performing a post-incident review is to:

Options:
A.

re-evaluate the impact of incidents.

B.

identify vulnerabilities.

C.

identify control improvements.

D.

identify the root cause.

Questions 219

Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?

Options:
A.

Evaluate the results of business continuity testing.

B.

Review key performance indicators (KPIs).

C.

Evaluate the business impact of incidents.

D.

Engage business process owners.

Questions 220

Which of the following is the PRIMARY objective of a cyber resilience strategy?

Options:
A.

Business continuity

B.

Regulatory compliance

C.

Employee awareness

D.

Executive support

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.