Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CISM Practice Exam with Questions & Answers | Set: 4

Questions 61

Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?

Options:
A.

Data privacy officer

B.

Information security manager

C.

Head of IT department

D.

Head of human resources (HR)

Isaca CISM Premium Access
Questions 62

The PRIMARY reason to properly classify information assets is to determine:

Options:
A.

appropriate encryption strength using a risk-based approach.

B.

the business impact if assets are compromised.

C.

the appropriate protection based on sensitivity.

D.

user access levels based on the need to know.

Questions 63

An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?

Options:
A.

Feedback from the vendor's previous clients

B.

Alignment of the vendor's business objectives with enterprise security goals

C.

The maturity of the vendor's internal control environment

D.

Penetration testing against the vendor's network

Questions 64

Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?

Options:
A.

Require remote wipe capabilities for devices.

B.

Conduct security awareness training.

C.

Review and update existing security policies.

D.

Enforce passwords and data encryption on the devices.

Questions 65

When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?

Options:
A.

Data is encrypted in transit and at rest at the vendor site.

B.

Data is subject to regular access log review.

C.

The vendor must be able to amend data.

D.

The vendor must agree to the organization's information security policy,

Questions 66

Which of the following should be the PRIMARY basis for a severity hierarchy for information security incident classification?

Options:
A.

Availability of resources

B.

Root cause analysis results

C.

Adverse effects on the business

D.

Legal and regulatory requirements

Questions 67

Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?

Options:
A.

Presenting evidence of inherent risk

B.

Reporting the security maturity level

C.

Presenting compliance requirements

D.

Communicating the residual risk

Questions 68

Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?

Options:
A.

Threat management is enhanced.

B.

Compliance status is improved.

C.

Security metrics are enhanced.

D.

Proactive risk management is facilitated.

Questions 69

The PRIMARY benefit of integrating information security activities into change management processes is to:

Options:
A.

protect the organization from unauthorized changes.

B.

ensure required controls are included in changes.

C.

provide greater accountability for security-related changes in the business.

D.

protect the business from collusion and compliance threats.

Questions 70

Which of the following is the MOST effective way to influence organizational culture to align with security guidelines?

Options:
A.

Adhere to regulatory requirements

B.

Conduct security awareness

C.

Document and distribute security procedures

D.

Communicate and enforce security policies

Questions 71

Which of the following is the BEST approach for governing noncompliance with security requirements?

Options:
A.

Base mandatory review and exception approvals on residual risk,

B.

Require users to acknowledge the acceptable use policy.

C.

Require the steering committee to review exception requests.

D.

Base mandatory review and exception approvals on inherent risk.

Questions 72

Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?

Options:
A.

Focus on addressing conflicts between security and performance.

B.

Collaborate with business and IT functions in determining controls.

C.

Include information security requirements in the change control process.

D.

Obtain assistance from IT to implement automated security cantrals.

Questions 73

Which of the following BEST enables an organization to determine the costs of downtime for a critical application?

Options:
A.

Fault tree analysis

B.

Cost-benefit analysis

C.

Return on investment (ROI) analysis

D.

Business impact analysis (BIA)

Questions 74

During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:

Options:
A.

perform a risk assessment.

B.

review the state of security awareness.

C.

review information security policies.

D.

perform a gap analysis.

Questions 75

When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?

Options:
A.

Digital currency is immediately available.

B.

Network access requires two-factor authentication.

C.

Data backups are recoverable from an offsite location.

D.

An alternative network link is immediately available.

Questions 76

Several months after the installation of a new firewall with intrusion prevention features to block malicious activity, a breach was discovered that came in through the firewall shortly after installation. This breach could have been detected earlier by implementing firewall:

Options:
A.

packet filtering.

B.

web surfing controls.

C.

log monitoring.

D.

application awareness.

Questions 77

Which of the following is the PRIMARY objective of incident triage?

Options:
A.

Coordination of communications

B.

Mitigation of vulnerabilities

C.

Categorization of events

D.

Containment of threats

Questions 78

An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?

Options:
A.

Local regulations

B.

Data backup strategy

C.

Consistency in awareness programs

D.

Organizational reporting structure

Questions 79

A business impact analysis (BIA) should be periodically executed PRIMARILY to:

Options:
A.

validate vulnerabilities on environmental changes.

B.

analyze the importance of assets.

C.

check compliance with regulations.

D.

verify the effectiveness of controls.

Questions 80

Which of the following should be the PRIMARY focus of a status report on the information security program to senior management?

Options:
A.

Providing evidence that resources are performing as expected

B.

Verifying security costs do not exceed the budget

C.

Demonstrating risk is managed at the desired level

D.

Confirming the organization complies with security policies

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.