Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Isaca CISM Practice Exam with Questions & Answers | Set: 9

Questions 161

Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?

Options:
A.

Force password changes on the SQL database.

B.

Reconfigure the web application firewall to block the attack.

C.

Update the detection patterns on the web application firewall.

D.

Block the IPs from where the attack originates.

Isaca CISM Premium Access
Questions 162

Which of the following should be the KEY consideration when creating an information security communication plan with industry peers?

Options:
A.

Balancing the benefits of information sharing with the drawbacks of sharing sensitive information

B.

Reducing the costs associated with information sharing by automating the process

C.

Ensuring information is detailed enough to be of use to other organizations

D.

Notifying the legal department whenever incident-related information is shared

Questions 163

Which of the following sources is MOST useful when planning a business-aligned information security program?

Options:
A.

Security risk register

B.

Information security policy

C.

Business impact analysis (BIA)

D.

Enterprise architecture (EA)

Questions 164

An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?

Options:
A.

Escalate to the chief risk officer (CRO).

B.

Conduct a vulnerability analysis.

C.

Conduct a risk analysis.

D.

Determine compensating controls.

Questions 165

An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:

Options:
A.

notify the business process owner.

B.

follow the business continuity plan (BCP).

C.

conduct an incident forensic analysis.

D.

follow the incident response plan.

Questions 166

Which of the following is the MOST important objective of post-incident review activities?

Options:
A.

Evidence collection

B.

Continuous improvement

C.

Incident triage

D.

Incident documentation

Questions 167

Which of the following should be the PRIMARY basis for determining the value of assets?

Options:
A.

Cost of replacing the assets

B.

Business cost when assets are not available

C.

Original cost of the assets minus depreciation

D.

Total cost of ownership (TCO)

Questions 168

Which of the following is MOST effective in monitoring an organization's existing risk?

Options:
A.

Periodic updates to risk register

B.

Risk management dashboards

C.

Security information and event management (SIEM) systems

D.

Vulnerability assessment results

Questions 169

Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?

Options:
A.

Information security manager

B.

Information security steering committee

C.

Information owner

D.

Senior management

Questions 170

Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?

Options:
A.

Information security program metrics

B.

Results of a recent external audit

C.

The information security operations matrix

D.

Changes to information security risks

Questions 171

Which of the following is the FIRST step in developing a business continuity plan (BCP)?

Options:
A.

Determine the business recovery strategy

B.

Determine available resources.

C.

Identify the applications with the shortest recovery time objectives (RTOs).

D.

Identify critical business processes.

Questions 172

Which of the following is the MOST important consideration during the design phase of a business impact analysis (BIA)?

Options:
A.

Selecting quality metrics to monitor business performance

B.

Estimating the likelihood that end-to-end processes will be disrupted

C.

Obtaining reserve funding to prepare for possible business failures

D.

Identifying critical functions for business operations

Questions 173

Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?

Options:
A.

Network address translation (NAT)

B.

Message hashing

C.

Transport Layer Security (TLS)

D.

Multi-factor authentication

Questions 174

Which of the following BEST supports effective communication during information security incidents7

Options:
A.

Frequent incident response training sessions

B.

Centralized control monitoring capabilities

C.

Responsibilities defined within role descriptions

D.

Predetermined service level agreements (SLAs)

Questions 175

Which of the following is MOST important to consider when aligning a security awareness program with the organization's business strategy?

Options:
A.

Regulations and standards

B.

People and culture

C.

Executive and board directives

D.

Processes and technology

Questions 176

An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:

Options:
A.

conduct an incident forensic analysis.

B.

fallow the incident response plan

C.

notify the business process owner.

D.

fallow the business continuity plan (BCP).

Questions 177

Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?

Options:
A.

Security risk assessments

B.

Lessons learned analysis

C.

Information security audits

D.

Key performance indicators (KPIs)

Questions 178

An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?

Options:
A.

Prepare an executive summary for senior management

B.

Gather feedback on business impact

C.

Conduct a meeting to capture lessons learned.

D.

Secure and preserve digital evidence for analysis.

Questions 179

Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?

Options:
A.

Current resourcing levels

B.

Availability of potential resources

C.

Information security strategy

D.

Information security incidents

Questions 180

The PRIMARY purpose for continuous monitoring of security controls is to ensure:

Options:
A.

control gaps are minimized.

B.

system availability.

C.

effectiveness of controls.

D.

alignment with compliance requirements.

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.