New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CISM Practice Exam with Questions & Answers | Set: 14

Questions 196

Which of the following is MOST important to include in security incident escalation procedures?

Options:
A.

Key objectives of the security program

B.

Recovery procedures

C.

Notification criteria

D.

Containment procedures

Isaca CISM Premium Access
Questions 197

Which of the following is the BEST indication that an organization has integrated information security governance with corporate governance?

Options:
A.

Security performance metrics are measured against business objectives.

B.

Impact is measured according to business loss when assessing IT risk.

C.

Security policies are reviewed whenever business objectives are changed.

D.

Service levels for security vendors are defined according to business needs.

Questions 198

Which of the following is MOST important to include in an information security policy?

Options:
A.

Best practices

B.

Management objectives

C.

Baselines

D.

Maturity levels

Questions 199

The PRIMARY purpose of implementing information security governance metrics is to:

Options:
A.

measure alignment with best practices.

B.

assess operational and program metrics.

C.

guide security towards the desired state.

D.

refine control operations.

Questions 200

Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?

Options:
A.

To enforce security policy requirements

B.

To maintain business asset inventories

C.

To ensure audit and compliance requirements are met

D.

To ensure the availability of business operations

Questions 201

The use of a business case to obtain funding for an information security investment is MOST effective when the business case:

Options:
A.

relates the investment to the organization's strategic plan.

B.

translates information security policies and standards into business requirements.

C.

articulates management's intent and information security directives in clear language.

D.

realigns information security objectives to organizational strategy.

Questions 202

Which of the following is the BEST way to determine the effectiveness of an incident response plan?

Options:
A.

Reviewing previous audit reports

B.

Conducting a tabletop exercise

C.

Benchmarking the plan against best practices

D.

Performing a penetration test

Questions 203

The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:

Options:
A.

the internal audit manager.

B.

the information security officer.

C.

the steering committee.

D.

the board of directors.

Questions 204

Which of the following is the MOST effective way to demonstrate alignment of information security strategy with business objectives?

Options:
A.

Balanced scorecard

B.

Risk matrix

C.

Benchmarking

D.

Heat map

Questions 205

Which of the following is MOST important when defining how an information security budget should be allocated?

Options:
A.

Regulatory compliance standards

B.

Information security strategy

C.

Information security policy

D.

Business impact assessment

Questions 206

Which of the following is the MOST important reason for logging firewall activity?

Options:
A.

Metrics reporting

B.

Firewall tuning

C.

Intrusion prevention

D.

Incident investigation

Questions 207

A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?

Options:
A.

Right of the subscriber to conduct onsite audits of the vendor

B.

Escrow of software code with conditions for code release

C.

Authority of the subscriber to approve access to its data

D.

Commingling of subscribers' data on the same physical server

Questions 208

Spoofing should be prevented because it may be used to:

Options:
A.

gain illegal entry to a secure system by faking the sender's address,

B.

predict which way a program will branch when an option is presented

C.

assemble information, track traffic, and identify network vulnerabilities.

D.

capture information such as passwords traveling through the network

Questions 209

The PRIMARY purpose for deploying information security metrics is to:

Options:
A.

compare program effectiveness to benchmarks.

B.

support ongoing security budget requirements.

C.

ensure that technical operations meet specifications.

D.

provide information needed to make decisions.

Questions 210

Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?

Options:
A.

The organization's risk tolerance

B.

Resource availability

C.

The organization's mission

D.

Incident response team training

Isaca Related Exams

How to pass Isaca CISA - Certified Information Systems Auditor Exam
How to pass Isaca CRISC - Certified in Risk and Information Systems Control Exam
How to pass Isaca CGEIT - Certified in the Governance of Enterprise IT Exam Exam
How to pass Isaca COBIT5 - COBIT 5 Foundation Exam Exam
How to pass Isaca CDPSE - Certified Data Privacy Solutions Engineer Exam
How to pass Isaca COBIT-2019 - COBIT 2019 Foundation Exam
How to pass Isaca NIST-COBIT-2019 - ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019 Exam

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.