Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Isaca CISM Practice Exam with Questions & Answers | Set: 6

Questions 101

Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?

Options:
A.

Heightened awareness of information security strategies

B.

Improved process resiliency in the event of attacks

C.

Promotion of security-by-design principles to the business

D.

Management accountability for information security

Isaca CISM Premium Access
Questions 102

Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?

Options:
A.

Threat analytics software

B.

Host intrusion detection system

C.

SIEM

D.

Network intrusion detection system

Questions 103

Which of the following BEST supports the incident management process for attacks on an organization's supply chain?

Options:
A.

Including service level agreements (SLAs) in vendor contracts

B.

Establishing communication paths with vendors

C.

Requiring security awareness training for vendor staff

D.

Performing integration testing with vendor systems

Questions 104

Which of the following should be done FIRST when implementing a security program?

Options:
A.

Perform a risk analysis

B.

Implement data encryption.

C.

Create an information asset inventory.

D.

Determine the value of information assets.

Questions 105

Which of the following presents the GREATEST risk associated with the use of an automated security information and event management (SIEM) system?

Options:
A.

Low number of false positives

B.

Low number of false negatives

C.

High number of false positives

D.

High number of false negatives

Questions 106

Information security policies should PRIMARILY reflect alignment with:

Options:
A.

an information security framework.

B.

industry best practices.

C.

data security standards.

D.

senior management intent.

Questions 107

The MOST important reason for having an information security manager serve on the change management committee is to:

Options:
A.

identify changes to the information security policy.

B.

ensure that changes are tested.

C.

ensure changes are properly documented.

D.

advise on change-related risk.

Questions 108

Which of the following is MOST helpful to identify whether information security policies have been followed?

Options:
A.

Preventive controls

B.

Detective controls

C.

Directive controls

D.

Corrective controls

Questions 109

Which of the following is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?

Options:
A.

Poor documentation of results and lessons learned

B.

Lack of communication to affected users

C.

Disruption to the production environment

D.

Lack of coordination among departments

Questions 110

Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?

Options:
A.

Obtain consensus on the strategy from the executive board.

B.

Review alignment with business goals.

C.

Define organizational risk tolerance.

D.

Develop a project plan to implement the strategy.

Questions 111

Which of the following change management procedures is MOST likely to cause concern to the information security manager?

Options:
A.

Fallback processes are tested the weekend before changes are made

B.

Users are not notified of scheduled system changes

C.

A manual rather than an automated process is used to compare program versions.

D.

The development manager migrates programs into production

Questions 112

Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:

Options:
A.

review access rights as the acquisition integration occurs.

B.

perform a risk assessment of the access rights.

C.

escalate concerns for conflicting access rights to management.

D.

implement consistent access control standards.

Questions 113

Recovery time objectives (RTOs) are an output of which of the following?

Options:
A.

Business continuity plan (BCP)

B.

Disaster recovery plan (DRP)

C.

Service level agreement (SLA)

D.

Business impact analysis (BIA)

Questions 114

Which of the following would provide the BEST evidence to senior management that security control performance has improved?

Options:
A.

Demonstrated return on security investment

B.

Reduction in inherent risk

C.

Results of an emerging threat analysis

D.

Review of security metrics trends

Questions 115

Which of the following is MOST important when designing security controls for new cloud-based services?

Options:
A.

Evaluating different types of deployment models according to the associated risks

B.

Understanding the business and IT strategy for moving resources to the cloud

C.

Defining an incident response policy to protect data moving between onsite and cloud applications

D.

Performing a business impact analysis (BIA) to gather information needed to develop recovery strategies

Questions 116

Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?

Options:
A.

Include the impact of the risk as part of regular metrics.

B.

Recommend the security steering committee conduct a review.

C.

Update the risk assessment at regular intervals

D.

Send regular notifications directly to senior managers

Questions 117

Which of the following BEST helps to ensure a third-party backup site continues to meet the organization’s information security standards?

Options:
A.

Service level agreement (SLA)

B.

Memorandum of understanding (MoU)

C.

Business continuity plan (BCP)

D.

Disaster recovery plan (DRP)

Questions 118

When establishing metrics for an information security program, the BEST approach is to identify indicators that:

Options:
A.

reduce information security program spending.

B.

support major information security initiatives.

C.

reflect the corporate risk culture.

D.

demonstrate the effectiveness of the security program.

Questions 119

Which of the following should be the PRIMARY objective when establishing a new information security program?

Options:
A.

Executing the security strategy

B.

Minimizing organizational risk

C.

Optimizing resources

D.

Facilitating operational security

Questions 120

Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?

Options:
A.

Establish an information security steering committee.

B.

Employ a process-based approach for information asset classification.

C.

Utilize an industry-recognized risk management framework.

D.

Provide security awareness training to board executives.

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.