New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CISM Practice Exam with Questions & Answers | Set: 12

Questions 166

Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?

Options:
A.

A security information and event management (SIEM) system

B.

An intrusion prevention system (IPS)

C.

A virtual private network (VPN) with multi-factor authentication (MFA)

D.

An identity and access management (IAM) system

Isaca CISM Premium Access
Questions 167

An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:

Options:
A.

a directory of approved local media contacts

B.

pre-prepared media statements

C.

procedures to contact law enforcement

D.

a single point of contact within the organization

Questions 168

An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST

important to present to senior management when reporting on the performance of this initiative?

Options:
A.

The cost and associated risk reduction

B.

Benchmarks of industry peers impacted by ransomware

C.

The number and severity of ransomware incidents

D.

The total cost of the investment

Questions 169

The MOST important information for influencing management’s support of information security is:

Options:
A.

an demonstration of alignment with the business strategy.

B.

An identification of the overall threat landscape.

C.

A report of a successful attack on a competitor.

D.

An identification of organizational risks.

Questions 170

Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?

Options:
A.

Isolate the PC from the network

B.

Perform a vulnerability scan

C.

Determine why the PC is not included in the inventory

D.

Reinforce information security training

Questions 171

A new information security manager finds that the organization tends to use short-term solutions to address problems. Resource allocation and spending are not effectively tracked, and there is no assurance that compliance requirements are being met. What should be done FIRST to reverse this bottom-up approach to security?

Options:
A.

Conduct a threat analysis.

B.

Implement an information security awareness training program.

C.

Establish an audit committee.

D.

Create an information security steering committee.

Questions 172

Which of the following is the GREATEST benefit of performing a tabletop exercise of the business continuity plan (BCP)?

Options:
A.

It identifies appropriate follow-up work to address shortcomings in the plan.

B.

It allows for greater participation and planning from the business side.

C.

It helps in assessing the availability of compatible backup hardware.

D.

It provides a low-cost method of assessing the BCP's completeness.

Questions 173

Which of the following is the PRIMARY benefit of implementing an information security governance framework?

Options:
A.

The framework defines managerial responsibilities for risk impacts to business goals.

B.

The framework provides direction to meet business goals while balancing risks and controls.

C.

The framework provides a roadmap to maximize revenue through the secure use of technology.

D.

The framework is able to confirm the validity of business goals and strategies.

Questions 174

To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?

Options:
A.

Gap analysis results

B.

Level of residual risk

C.

Level of risk treatment

D.

Configuration parameters

Questions 175

An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?

Options:
A.

Allow the practice to continue temporarily for monitoring purposes.

B.

Disable the employees' remote access to company email and data

C.

Initiate remote wipe of the devices

D.

Assess the business need to provide a secure solution

Questions 176

Which of the following is ESSENTIAL to ensuring effective incident response?

Options:
A.

Business continuity plan (BCP)

B.

Cost-benefit analysis

C.

Classification scheme

D.

Senior management support

Questions 177

Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?

Options:
A.

Security risk assessments

B.

Lessons learned analysis

C.

Information security audits

D.

Key performance indicators (KPIs)

Questions 178

An email digital signature will:

Options:
A.

protect the confidentiality of an email message.

B.

verify to recipient the integrity of an email message.

C.

automatically correct unauthorized modification of an email message.

D.

prevent unauthorized modification of an email message.

Questions 179

Which of the following will BEST enable an effective information asset classification process?

Options:
A.

Including security requirements in the classification process

B.

Analyzing audit findings

C.

Reviewing the recovery time objective (RTO) requirements of the asset

D.

Assigning ownership

Questions 180

When integrating security risk management into an organization it is MOST important to ensure:

Options:
A.

business units approve the risk management methodology.

B.

the risk treatment process is defined.

C.

information security policies are documented and understood.

D.

the risk management methodology follows an established framework.

Isaca Related Exams

How to pass Isaca CISA - Certified Information Systems Auditor Exam
How to pass Isaca CRISC - Certified in Risk and Information Systems Control Exam
How to pass Isaca CGEIT - Certified in the Governance of Enterprise IT Exam Exam
How to pass Isaca COBIT5 - COBIT 5 Foundation Exam Exam
How to pass Isaca CDPSE - Certified Data Privacy Solutions Engineer Exam
How to pass Isaca COBIT-2019 - COBIT 2019 Foundation Exam
How to pass Isaca NIST-COBIT-2019 - ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019 Exam

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.