Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Isaca CISM Practice Exam with Questions & Answers | Set: 7

Questions 121

In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or

Options:
A.

Security budget

B.

Risk register

C.

Risk score

D.

Laws and regulations

Isaca CISM Premium Access
Questions 122

Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?

Options:
A.

Impact of service interruption

B.

Results of recovery testing

C.

Determination of recovery point objective (RPO)

D.

Direction from senior management

Questions 123

Which of the following is MOST important to include in a post-incident review following a data breach?

Options:
A.

An evaluation of the effectiveness of the information security strategy

B.

Evaluations of the adequacy of existing controls

C.

Documentation of regulatory reporting requirements

D.

A review of the forensics chain of custom

Questions 124

An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?

Options:
A.

Present a diagram of core Zero Trust logical components to help visualize the architectural changes

B.

Summarize the training plan and end user feedback in an internal portal and send the link to the board

C.

Prepare a report on the Zero Trust implementation that includes a status dashboard and timeline

D.

Provide an outline of the business impact in terms of risk reduction and changes in user experience

Questions 125

A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?

Options:
A.

Invoke the incident response plan

B.

Implement role-based access control (RBAC)

C.

Remove access to the information

D.

Delete the information from the file server

Questions 126

Labeling information according to its security classification:

Options:
A.

enhances the likelihood of people handling information securely.

B.

reduces the number and type of countermeasures required.

C.

reduces the need to identify baseline controls for each classification.

D.

affects the consequences if information is handled insecurely.

Questions 127

Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?

Options:
A.

To identify the organization's risk tolerance

B.

To improve security processes

C.

To align security roles and responsibilities

D.

To optimize security risk management

Questions 128

Which of the following is the PRIMARY reason to use a phased incident recovery approach?

Options:
A.

To gain management buy-in

B.

To give the response team time to analyze incidents

C.

To ensure critical systems are recovered first

D.

To prioritize remediation steps

Questions 129

Which of the following should be the FIRST step in developing an information security strategy?

Options:
A.

Determine acceptable levels of information security risk

B.

Create a roadmap to identify security baselines and controls

C.

Perform a gap analysis based on the current state

D.

Identify key stakeholders to champion information security

Questions 130

When establishing an information security governance framework, it is MOST important for an information security manager to understand:

Options:
A.

information security best practices.

B.

risk management techniques.

C.

the threat environment.

D.

the corporate culture.

Questions 131

After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?

Options:
A.

EradicationB Recovery

B.

Lessons learned review

C.

Incident declaration

Questions 132

Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?

Options:
A.

The capabilities and expertise of the information security team

B.

The organization's mission statement and roadmap

C.

A prior successful information security strategy

D.

The organization's information technology (IT) strategy

Questions 133

A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?

Options:
A.

Conduct automated scans on applications before deployment.

B.

Supplement existing development teams with security engineers.

C.

Integrate information security into existing change management.

D.

Create a new governance council for application security.

Questions 134

Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?

Options:
A.

Projected Increase in maturity level

B.

Estimated reduction in risk

C.

Projected costs over time

D.

Estimated increase in efficiency

Questions 135

During which of the following development phases is it MOST challenging to implement security controls?

Options:
A.

Post-implementation phase

B.

Implementation phase

C.

Development phase

D.

Design phase

Questions 136

Which of the following is the MOST important reason to involve external forensics experts in evidence collection when responding to a major security breach?

Options:
A.

To ensure evidence is handled by qualified resources

B.

To validate the incident response process

C.

To provide the response team with expert training on evidence handling

D.

To prevent evidence from being disclosed to any internal staff members

Questions 137

Which of the following is the BEST indicator of the maturity level of a vendor risk management process?

Options:
A.

Average time required to complete the vendor risk management process

B.

Percentage of vendors that have gone through the vendor onboarding process

C.

Percentage of vendors that are regularly reviewed against defined criteria

D.

Number of vendors rejected because of security review results

Questions 138

How does an incident response team BEST leverage the results of a business impact analysis (BIA)?

Options:
A.

Assigning restoration priority during incidents

B.

Determining total cost of ownership (TCO)

C.

Evaluating vendors critical to business recovery

D.

Calculating residual risk after the incident recovery phase

Questions 139

Which of the following is the BEST indication of an effective information security awareness training program?

Options:
A.

An increase in the frequency of phishing tests

B.

An increase in positive user feedback

C.

An increase in the speed of incident resolution

D.

An increase in the identification rate during phishing simulations

Questions 140

Which of the following is MOST critical when creating an incident response plan?

Options:
A.

Identifying vulnerable data assets

B.

Identifying what constitutes an incident

C.

Documenting incident notification and escalation processes

D.

Aligning with the risk assessment process

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.