Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CISM Practice Exam with Questions & Answers | Set: 8

Questions 141

When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?

Options:
A.

Managing the impact

B.

Identifying unacceptable risk levels

C.

Assessing vulnerabilities

D.

Evaluating potential threats

Isaca CISM Premium Access
Questions 142

Reevaluation of risk is MOST critical when there is:

Options:
A.

resistance to the implementation of mitigating controls.

B.

a management request for updated security reports.

C.

a change in security policy.

D.

a change in the threat landscape.

Questions 143

Which of the following has the GREATEST impact on efforts to improve an organization's security posture?

Options:
A.

Regular reporting to senior management

B.

Supportive tone at the top regarding security

C.

Automation of security controls

D.

Well-documented security policies and procedures

Questions 144

Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?

Options:
A.

Compromise of critical assets via third-party resources

B.

Unavailability of services provided by a supplier

C.

Loss of customers due to unavailability of products

D.

Unreliable delivery of hardware and software resources by a supplier

Questions 145

The PRIMARY purpose for deploying information security metrics is to:

Options:
A.

compare program effectiveness to benchmarks.

B.

support ongoing security budget requirements.

C.

ensure that technical operations meet specifications.

D.

provide information needed to make decisions.

Questions 146

If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:

Options:
A.

contact law enforcement.

B.

document the chain of custody.

C.

capture evidence using standard server-backup utilities.

D.

reboot affected machines in a secure area to search for evidence.

Questions 147

Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?

Options:
A.

A security information and event management (SIEM) system

B.

An intrusion prevention system (IPS)

C.

A virtual private network (VPN) with multi-factor authentication (MFA)

D.

An identity and access management (IAM) system

Questions 148

The categorization of incidents is MOST important for evaluating which of the following?

Options:
A.

Appropriate communication channels

B.

Allocation of needed resources

C.

Risk severity and incident priority

D.

Response and containment requirements

Questions 149

An incident handler is preparing a forensic image of a hard drive. Which of the following MUST be done to provide evidence that the image is an exact copy of the original?

Options:
A.

Perform a manual verification of file counts.

B.

Encrypt and back up the hard drive before copying.

C.

Use the same hardware for the image as the original.

D.

Perform digital hashing of the original and the image.

Questions 150

When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?

Options:
A.

Risk owner

B.

Control owner

C.

Business system owner

D.

Application owner

Questions 151

Network isolation techniques are immediately implemented after a security breach to:

Options:
A.

preserve evidence as required for forensics

B.

reduce the extent of further damage.

C.

allow time for key stakeholder decision making.

D.

enforce zero trust architecture principles.

Questions 152

Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?

Options:
A.

Follow the escalation process.

B.

Identify the indicators of compromise.

C.

Notify law enforcement.

D.

Contact forensic investigators.

Questions 153

An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?

Options:
A.

Enforce the policy.

B.

Modify the policy.

C.

Present the risk to senior management.

D.

Create an exception for the deviation.

Questions 154

A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?

Options:
A.

Information security manager

B.

Security policy author

C.

Creator of the document

D.

Data custodian

Questions 155

Which of the following is the BEST approach to make strategic information security decisions?

Options:
A.

Establish regular information security status reporting.

B.

Establish an information security steering committee.

C.

Establish business unit security working groups.

D.

Establish periodic senior management meetings.

Questions 156

An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?

Options:
A.

The number of blocked external attacks is not representative of the true threat profile.

B.

The number of blocked external attacks will vary by month, causing inconsistent graphs.

C.

The number of blocked external attacks is an indicator of the organization's popularity.

D.

The number of blocked external attacks over time does not explain the attackers' motivations.

Questions 157

Which of the following is the PRIMARY reason to assign a risk owner in an organization?

Options:
A.

To remediate residual risk

B.

To define responsibilities

C.

To ensure accountability

D.

To identify emerging risk

Questions 158

An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?

Options:
A.

IT strategy

B.

Security architecture

C.

Business case

D.

Risk assessment

Questions 159

Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?

Options:
A.

Incorporate policy statements derived from third-party standards and benchmarks.

B.

Adhere to a unique corporate privacy and security standard

C.

Establish baseline standards for all locations and add supplemental standards as required

D.

Require that all locations comply with a generally accepted set of industry

Questions 160

Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?

Options:
A.

To facilitate a qualitative risk assessment following the BIA

B.

To increase awareness of information security among key stakeholders

C.

To ensure the stakeholders providing input own the related risk

D.

To obtain input from as many relevant stakeholders as possible

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.