Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Isaca CISM Practice Exam with Questions & Answers | Set: 13

Questions 241

Which of the following is the MOST effective way to prevent information security incidents?

Options:
A.

Implementing a security information and event management (SIEM) tool

B.

Implementing a security awareness training program for employees

C.

Deploying a consistent incident response approach

D.

Deploying intrusion detection tools in the network environment

Isaca CISM Premium Access
Questions 242

What is the PRIMARY objective of performing a vulnerability assessment following a business system update?

Options:
A.

Determine operational losses.

B.

Improve the change control process.

C.

Update the threat landscape.

D.

Review the effectiveness of controls

Questions 243

Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?

Options:
A.

Requiring an external security audit of the IT service provider

B.

Requiring regular reporting from the IT service provider

C.

Defining information security requirements with internal IT

D.

Defining the business recovery plan with the IT service provider

Questions 244

Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?

Options:
A.

Inform the public relations officer.

B.

Monitor the third party's response.

C.

Invoke the incident response plan.

D.

Inform customers of the breach.

Questions 245

Which of the following is ESSENTIAL to ensuring effective incident response?

Options:
A.

Business continuity plan (BCP)

B.

Cost-benefit analysis

C.

Classification scheme

D.

Senior management support

Questions 246

Which of the following is the PRIMARY reason to conduct a post-incident review?

Options:
A.

To aid in future risk assessments

B.

To improve the response process

C.

To determine whether digital evidence is admissible

D.

To notify regulatory authorities

Questions 247

Which of the following is the MOST important outcome of effective risk treatment?

Options:
A.

Elimination of risk

B.

Timely reporting of incidents

C.

Reduced cost of acquiring controls

D.

Implementation of corrective actions

Questions 248

Which of the following MUST happen immediately following the identification of a malware incident?

Options:
A.

Preparation

B.

Recovery

C.

Containment

D.

Eradication

Questions 249

What should an information security manager verify FIRST when reviewing an information asset management program?

Options:
A.

System owners have been identified.

B.

Key applications have been secured.

C.

Information assets have been classified.

D.

Information assets have been inventoried.

Questions 250

An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?

Options:
A.

Reinforce security awareness practices for end users.

B.

Temporarily outsource the email system to a cloud provider.

C.

Develop a business case to replace the system.

D.

Monitor outgoing traffic on the firewall.

Questions 251

An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?

Options:
A.

Refer the issue to internal audit for a recommendation.

B.

Re-classify the data and increase the security level to meet business risk.

C.

Instruct the relevant system owners to reclassify the data.

D.

Complete a risk assessment and refer the results to the data owners.

Questions 252

Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?

Options:
A.

Decrease in false positives

B.

Increase in false positives

C.

Increase in false negatives

D.

Decrease in false negatives

Questions 253

Which of the following provides the MOST effective response against ransomware attacks?

Options:
A.

Automatic quarantine of systems

B.

Thorough communication plans

C.

Effective backup plans and processes

D.

Strong password requirements

Questions 254

During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?

Options:
A.

Configuration management

B.

Password management

C.

Change management

D.

Version management

Questions 255

Before approving the implementation of a new security solution, senior management requires a business case. Which of the following would BEST support the justification for investment?

Options:
A.

The solution contributes to business strategy.

B.

The solution improves business risk tolerance levels.

C.

The solution improves business resiliency.

D.

The solution reduces the cost of noncompliance with regulations.

Questions 256

Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?

Options:
A.

Align the standards with the organizational policy.

B.

Align the standards with industry best practices.

C.

Resolve the discrepancy before developing the standards.

D.

Perform a cost-benefit analysis of aligning the standards to policy.

Questions 257

Which of the following is the BEST course of action when an information security manager identifies that systems are vulnerable to emerging threats?

Options:
A.

Frequently update systems and monitor the threat landscape.

B.

Monitor the network containing the affected systems for malicious traffic.

C.

Increase awareness of the threats among employees who work with the systems.

D.

Notify senior management and key stakeholders of the threats.

Questions 258

Threat and vulnerability assessments are important PRIMARILY because they are:

Options:
A.

used to establish security investments

B.

the basis for setting control objectives.

C.

elements of the organization's security posture.

D.

needed to estimate risk.

Questions 259

Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?

Options:
A.

Computer forensics

B.

Continuous log monitoring

C.

Root cause analysis

D.

Penetration testing

Questions 260

An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:

Options:
A.

a control self-assessment (CSA) process.

B.

automated reporting to stakeholders.

C.

a monitoring process for the security policy.

D.

metrics for each milestone.

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.