New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CISM Practice Exam with Questions & Answers | Set: 11

Questions 151

In which cloud model does the cloud service buyer assume the MOST security responsibility?

Options:
A.

Disaster Recovery as a Service (DRaaS)

B.

Infrastructure as a Service (laaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Isaca CISM Premium Access
Questions 152

Which of the following is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?

Options:
A.

To compare emerging trends with the existing organizational security posture

B.

To communicate worst-case scenarios to senior management

C.

To train information security professionals to mitigate new threats

D.

To determine opportunities for expanding organizational information security

Questions 153

Which of the following is the MOST important consideration when establishing an organization's information security governance committee?

Options:
A.

Members have knowledge of information security controls.

B.

Members are business risk owners.

C.

Members are rotated periodically.

D.

Members represent functions across the organization.

Questions 154

Which of the following is the MOST important factor of a successful information security program?

Options:
A.

The program follows industry best practices.

B.

The program is based on a well-developed strategy.

C.

The program is cost-efficient and within budget,

D.

The program is focused on risk management.

Questions 155

Penetration testing is MOST appropriate when a:

Options:
A.

new system is about to go live.

B.

new system is being designed.

C.

security policy is being developed.

D.

security incident has occurred,

Questions 156

In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?

Options:
A.

Ownership of security

B.

Compliance with policies

C.

Auditability of systems

D.

Allocation of training resources

Questions 157

An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:

Options:
A.

the chief risk officer (CRO).

B.

business senior management.

C.

the information security manager.

D.

the compliance officer.

Questions 158

Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:

Options:
A.

a function of the likelihood and impact, should a threat exploit a vulnerability.

B.

the magnitude of the impact, should a threat exploit a vulnerability.

C.

a function of the cost and effectiveness of controls over a vulnerability.

D.

the likelihood of a given threat attempting to exploit a vulnerability

Questions 159

Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?

Options:
A.

Perform a patch update.

B.

Conduct a risk assessment.

C.

Perform a penetration test.

D.

Conduct an impact assessment.

Questions 160

Which of the following is the BEST way to address data availability concerns when outsourcing information security administration?

Options:
A.

Develop service level agreements (SLAs).

B.

Stipulate insurance requirements.

C.

Require nondisclosure agreements (NDAs).

D.

Create contingency plans.

Questions 161

Which of the following should be the FIRST step in developing an information security strategy?

Options:
A.

Perform a gap analysis based on the current state

B.

Create a roadmap to identify security baselines and controls.

C.

Identify key stakeholders to champion information security.

D.

Determine acceptable levels of information security risk.

Questions 162

Which of the following provides the BEST input to determine the level of protection needed for an IT system?

Options:
A.

Vulnerability assessment

B.

Asset classification

C.

Threat analysis

D.

Internal audit findings

Questions 163

In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?

Options:
A.

Access to the hardware

B.

Data encryption

C.

Non-standard event logs

D.

Compressed customer data

Questions 164

Which of the following BEST enables an organization to maintain legally admissible evidence7

Options:
A.

Documented processes around forensic records retention

B.

Robust legal framework with notes of legal actions

C.

Chain of custody forms with points of contact

D.

Forensic personnel training that includes technical actions

Questions 165

Which of the following metrics would provide an accurate measure of an information security program's performance?

Options:
A.

A collection of qualitative indicators that accurately measure security exceptions

B.

A combination of qualitative and quantitative trends that enable decision making

C.

A collection of quantitative indicators that are compared against industry benchmarks

D.

A single numeric score derived from various measures assigned to the security program

Isaca Related Exams

How to pass Isaca CISA - Certified Information Systems Auditor Exam
How to pass Isaca CRISC - Certified in Risk and Information Systems Control Exam
How to pass Isaca CGEIT - Certified in the Governance of Enterprise IT Exam Exam
How to pass Isaca COBIT5 - COBIT 5 Foundation Exam Exam
How to pass Isaca CDPSE - Certified Data Privacy Solutions Engineer Exam
How to pass Isaca COBIT-2019 - COBIT 2019 Foundation Exam
How to pass Isaca NIST-COBIT-2019 - ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019 Exam

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.