Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CISM Practice Exam with Questions & Answers | Set: 5

Questions 81

Which of the following is a function of the information security steering committee?

Options:
A.

Deliver external communication during incident response.

B.

Align the security framework with security standards.

C.

Align security strategy with business objectives.

D.

Monitor regulatory requirements.

Isaca CISM Premium Access
Questions 82

Which of the following is the BEST way to enhance training for incident response teams?

Options:
A.

Perform post-incident reviews.

B.

Establish incident key performance indicators (KPIs).

C.

Conduct interviews with organizational units.

D.

Participate in emergency response activities.

Questions 83

Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?

Options:
A.

Demonstrating the program's value to the organization

B.

Discussing governance programs found in similar organizations

C.

Providing the results of external audits

D.

Providing examples of information security incidents within the organization

Questions 84

A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?

Options:
A.

Provide end-user training.

B.

Escalate to senior management.

C.

Continue to enforce the policy.

D.

Conduct a business impact analysis (BIA).

Questions 85

An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:

Options:
A.

the security organization structure.

B.

international security standards.

C.

risk assessment results.

D.

the most stringent requirements.

Questions 86

Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?

Options:
A.

Regulatory requirements

B.

Compliance acceptance

C.

Management support

D.

Budgetary approval

Questions 87

Which of the following is the BEST starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities?

Options:
A.

Controls analysis

B.

Emerging risk review

C.

Penetration testing

D.

Traffic monitoring

Questions 88

An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:

Options:
A.

determine the security exposures.

B.

assess the ability to integrate the security department operations.

C.

ensure compliance with international standards.

D.

evaluate the security policy and standards.

Questions 89

An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?

Options:
A.

Security requirements are included in the vendor contract

B.

External security audit results are reviewed.

C.

Service level agreements (SLAs) meet operational standards.

D.

Business continuity contingency planning is provided

Questions 90

Which of the following is MOST important to convey to employees in building a security risk-aware culture?

Options:
A.

Personal information requires different security controls than sensitive information.

B.

Employee access should be based on the principle of least privilege.

C.

Understanding an information asset's value is critical to risk management.

D.

The responsibility for security rests with all employees.

Questions 91

The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:

Options:
A.

validate the confidentiality during analysis.

B.

reinstate original data when accidental changes occur.

C.

validate the integrity during analysis.

D.

provide backup in case of media failure.

Questions 92

Which type of policy BEST helps to ensure that all employees, contractors, and third-party users receive formal communication regarding an organization’s security program?

Options:
A.

Management review policy

B.

Business continuity management policy

C.

Information security training policy

D.

Security incident management policy

Questions 93

The BEST way to identify the risk associated with a social engineering attack is to:

Options:
A.

monitor the intrusion detection system (IDS),

B.

review single sign-on (SSO) authentication lags.

C.

test user knowledge of information security practices.

D.

perform a business risk assessment of the email filtering system.

Questions 94

Which of the following should include contact information for representatives of equipment and software vendors?

Options:
A.

Information security program charter

B.

Business impact analysis (BIA)

C.

Service level agreements (SLAs)

D.

Business continuity plan (BCP)

Questions 95

Which of the following BEST facilitates the effective execution of an incident response plan?

Options:
A.

The plan is based on risk assessment results.

B.

The response team is trained on the plan

C.

The plan is based on industry best practice.

D.

The incident response plan aligns with the IT disaster recovery plan (DRP).

Questions 96

In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?

Options:
A.

Access to the hardware

B.

Data encryption

C.

Non-standard event logs

D.

Compressed customer data

Questions 97

Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?

Options:
A.

Suspend the data exchange with the provider

B.

Notify appropriate regulatory authorities of the breach.

C.

Initiate the business continuity plan (BCP)

D.

Validate the breach with the provider

Questions 98

In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?

Options:
A.

Maturity of the security policy

B.

Clarity of security roles and responsibilities

C.

Corporate culture

D.

Corporate risk framework

Questions 99

A penetration test against an organization's external web application shows several vulnerabilities. Which of the following presents the GREATEST concern?

Options:
A.

A rules of engagement form was not signed prior to the penetration test

B.

Vulnerabilities were not found by internal tests

C.

Vulnerabilities were caused by insufficient user acceptance testing (UAT)

D.

Exploit code for one of the vulnerabilities is publicly available

Questions 100

Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?

Options:
A.

Impact on compliance risk.

B.

Inability to determine short-term impact.

C.

Impact on the risk culture.

D.

Deviation from risk management best practices

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.