Weekend Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Isaca CISM Practice Exam with Questions & Answers | Set: 2

Questions 16

Threat and vulnerability assessments are important PRIMARILY because they are:

Options:
A.

used to establish security investments

B.

the basis for setting control objectives.

C.

elements of the organization's security posture.

D.

needed to estimate risk.

Isaca CISM Premium Access
Questions 17

Which of the following is the BEST course of action when an online company discovers a network attack in progress?

Options:
A.

Dump all event logs to removable media

B.

Isolate the affected network segment

C.

Enable trace logging on ail events

D.

Shut off all network access points

Questions 18

The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:

Options:
A.

validate the confidentiality during analysis.

B.

reinstate original data when accidental changes occur.

C.

validate the integrity during analysis.

D.

provide backup in case of media failure.

Questions 19

An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?

Options:
A.

Store disaster recovery documentation in a public cloud.

B.

Maintain an outsourced contact center in another country.

C.

Require disaster recovery documentation be stored with all key decision makers.

D.

Provide annual disaster recovery training to appropriate staff.

Questions 20

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

Options:
A.

Wipe and reset the endpoint device.

B.

Isolate the endpoint device.

C.

Power off the endpoint device.

D.

Run a virus scan on the endpoint device.

Questions 21

Which of the following is the BEST indication of information security strategy alignment with the “&

Options:
A.

Percentage of information security incidents resolved within defined service level agreements (SLAs)

B.

Percentage of corporate budget allocated to information security initiatives

C.

Number of business executives who have attended information security awareness sessions

D.

Number of business objectives directly supported by information security initiatives

Questions 22

Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?

Options:
A.

Host patching

B.

Penetration testing

C.

Infrastructure hardening

D.

Data classification

Questions 23

Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?

Options:
A.

Verify that information security requirements are included in the contract.

B.

Request customer references from the vendor.

C.

Require vendors to complete information security questionnaires.

D.

Review the results of the vendor's independent control reports.

Questions 24

Which of the following analyses will BEST identify the external influences to an organization's information security?

Options:
A.

Business impact analysis (BIA)

B.

Gap analysis

C.

Threat analysis

D.

Vulnerability analysis

Questions 25

Which of the following is the MOST effective way to prevent information security incidents?

Options:
A.

Implementing a security information and event management (SIEM) tool

B.

Implementing a security awareness training program for employees

C.

Deploying a consistent incident response approach

D.

Deploying intrusion detection tools in the network environment

Questions 26

The PRIMARY objective of performing a post-incident review is to:

Options:
A.

re-evaluate the impact of incidents

B.

identify vulnerabilities

C.

identify control improvements.

D.

identify the root cause.

Questions 27

Recovery time objectives (RTOs) are BEST determined by:

Options:
A.

business managers

B.

business continuity officers

C.

executive management

D.

database administrators (DBAs).

Questions 28

Which of the following is the BEST indication that an organization has a mature information security culture?

Options:
A.

Information security training is mandatory for all staff.

B.

The organization's information security policy is documented and communicated.

C.

The chief information security officer (CISO) regularly interacts with the board.

D.

Staff consistently consider risk in making decisions.

Questions 29

Which of the following has the GREATEST influence on an organization's information security strategy?

Options:
A.

The organization's risk tolerance

B.

The organizational structure

C.

Industry security standards

D.

Information security awareness

Questions 30

The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:

Options:
A.

results of exit interviews.

B.

previous training sessions.

C.

examples of help desk requests.

D.

responses to security questionnaires.

Isaca Related Exams

How to pass Isaca CISA - Certified Information Systems Auditor Exam
How to pass Isaca CRISC - Certified in Risk and Information Systems Control Exam
How to pass Isaca CGEIT - Certified in the Governance of Enterprise IT Exam Exam
How to pass Isaca COBIT5 - COBIT 5 Foundation Exam Exam
How to pass Isaca CDPSE - Certified Data Privacy Solutions Engineer Exam
How to pass Isaca COBIT-2019 - COBIT 2019 Foundation Exam
How to pass Isaca NIST-COBIT-2019 - ISACA Implementing the NIST Cybersecurity Framework using COBIT 2019 Exam

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.