ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 70

Question list
Search
Search

Of the following, who is BEST suited to own the risk discovered in an application?

A.
Information security manager
A.
Information security manager
Answers
B.
Senior management
B.
Senior management
Answers
C.
System owner
C.
System owner
Answers
D.
Control owner
D.
Control owner
Answers
Suggested answer: C

A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?

A.
Provide end-user training.
A.
Provide end-user training.
Answers
B.
Escalate to senior management.
B.
Escalate to senior management.
Answers
C.
Continue to enforce the policy.
C.
Continue to enforce the policy.
Answers
D.
Conduct a business impact analysis (BIA).
D.
Conduct a business impact analysis (BIA).
Answers
Suggested answer: A

When building support for an information security program, which of the following elements is MOST important?

A.
Identification of existing vulnerabilities
A.
Identification of existing vulnerabilities
Answers
B.
Information risk assessment
B.
Information risk assessment
Answers
C.
Business impact analysis (BIA)
C.
Business impact analysis (BIA)
Answers
D.
Threat analysis
D.
Threat analysis
Answers
Suggested answer: B

A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?

A.
Automate user provisioning activities.
A.
Automate user provisioning activities.
Answers
B.
Maintain strict control over user provisioning activities.
B.
Maintain strict control over user provisioning activities.
Answers
C.
Formally document IT administrator activities.
C.
Formally document IT administrator activities.
Answers
D.
Implement monitoring of IT administrator activities.
D.
Implement monitoring of IT administrator activities.
Answers
Suggested answer: D

Which of the following is the BEST indicator of an emerging incident?

A.
A weakness identified within an organization's information systems
A.
A weakness identified within an organization's information systems
Answers
B.
Customer complaints about lack of website availability
B.
Customer complaints about lack of website availability
Answers
C.
A recent security incident at an industry competitor
C.
A recent security incident at an industry competitor
Answers
D.
Attempted patching of systems resulting in errors
D.
Attempted patching of systems resulting in errors
Answers
Suggested answer: B

Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?

A.
Recovery
A.
Recovery
Answers
B.
Identification
B.
Identification
Answers
C.
Containment
C.
Containment
Answers
D.
Preparation
D.
Preparation
Answers
Suggested answer: C

Data classification is PRIMARILY the responsibility of:

A.
senior management.
A.
senior management.
Answers
B.
the data custodian.
B.
the data custodian.
Answers
C.
the data owner.
C.
the data owner.
Answers
D.
the security manager.
D.
the security manager.
Answers
Suggested answer: C

Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?

A.
Current resourcing levels
A.
Current resourcing levels
Answers
B.
Availability of potential resources
B.
Availability of potential resources
Answers
C.
Information security strategy
C.
Information security strategy
Answers
D.
Information security incidents
D.
Information security incidents
Answers
Suggested answer: A

To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?

A.
Data storage procedures
A.
Data storage procedures
Answers
B.
Data classification policy
B.
Data classification policy
Answers
C.
Results of penetration testing
C.
Results of penetration testing
Answers
D.
Features of data protection products
D.
Features of data protection products
Answers
Suggested answer: B

Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?

A.
Senior management
A.
Senior management
Answers
B.
Application owner
B.
Application owner
Answers
C.
Information security manager
C.
Information security manager
Answers
D.
Legal representative
D.
Legal representative
Answers
Suggested answer: A
Total 793 questions
Go to page: of 80