ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 73

Question list
Search
Search

Which or the following is MOST important to consider when determining backup frequency?

A.
Recovery point objective (RPO)
A.
Recovery point objective (RPO)
Answers
B.
Recovery time objective (RTO)
B.
Recovery time objective (RTO)
Answers
C.
Allowable interruption window
C.
Allowable interruption window
Answers
D.
Maximum tolerable outage (MTO)
D.
Maximum tolerable outage (MTO)
Answers
Suggested answer: A

Which of the following is the BEST way to address data availability concerns when outsourcing information security administration?

A.
Develop service level agreements (SLAs).
A.
Develop service level agreements (SLAs).
Answers
B.
Stipulate insurance requirements.
B.
Stipulate insurance requirements.
Answers
C.
Require nondisclosure agreements (NDAs).
C.
Require nondisclosure agreements (NDAs).
Answers
D.
Create contingency plans.
D.
Create contingency plans.
Answers
Suggested answer: D

What should be the FIRST step when implementing data loss prevention (DLP) technology?

A.
Perform due diligence with vendor candidates.
A.
Perform due diligence with vendor candidates.
Answers
B.
Build a business case.
B.
Build a business case.
Answers
C.
Classify the organization's data.
C.
Classify the organization's data.
Answers
D.
Perform a cost-benefit analysis.
D.
Perform a cost-benefit analysis.
Answers
Suggested answer: C

In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?

A.
Access to the hardware
A.
Access to the hardware
Answers
B.
Data encryption
B.
Data encryption
Answers
C.
Non-standard event logs
C.
Non-standard event logs
Answers
D.
Compressed customer data
D.
Compressed customer data
Answers
Suggested answer: C

Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?

A.
Mapping the risks to the security classification scheme
A.
Mapping the risks to the security classification scheme
Answers
B.
Illustrating risk on a heat map
B.
Illustrating risk on a heat map
Answers
C.
Mapping the risks to existing controls
C.
Mapping the risks to existing controls
Answers
D.
Providing a technical risk assessment report
D.
Providing a technical risk assessment report
Answers
Suggested answer: B

Which of the following is the BEST indicator of a successful intrusion into an organization's systems?

A.
Decrease in internal network traffic
A.
Decrease in internal network traffic
Answers
B.
Increase in the number of failed login attempts
B.
Increase in the number of failed login attempts
Answers
C.
Increase in the number of irregular application requests
C.
Increase in the number of irregular application requests
Answers
D.
Decrease in available storage space
D.
Decrease in available storage space
Answers
Suggested answer: C

Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?

A.
Reliable image backups
A.
Reliable image backups
Answers
B.
Impact assessment
B.
Impact assessment
Answers
C.
Documented eradication procedures
C.
Documented eradication procedures
Answers
D.
Root cause analysis
D.
Root cause analysis
Answers
Suggested answer: A

Which of the following is MOST important to determine following the discovery and eradication of a malware attack?

A.
The malware entry path
A.
The malware entry path
Answers
B.
The creator of the malware
B.
The creator of the malware
Answers
C.
The type of malware involved
C.
The type of malware involved
Answers
D.
The method of detecting the malware
D.
The method of detecting the malware
Answers
Suggested answer: A

What should a global information security manager do FIRST when informed that a new regulation with significant impact will go into effect soon?

A.
Perform a privacy impact assessment (PIA).
A.
Perform a privacy impact assessment (PIA).
Answers
B.
Perform a vulnerability assessment.
B.
Perform a vulnerability assessment.
Answers
C.
Perform a gap analysis.
C.
Perform a gap analysis.
Answers
D.
Perform a business impact analysis (BIA).
D.
Perform a business impact analysis (BIA).
Answers
Suggested answer: C

An organization has been penalized by regulatory authorities for failing to notify them of a major security breach that may have compromised customer data. Which of the following is MOST likely in need of review and updating to prevent similar penalties in the future?

A.
Information security policies and procedures
A.
Information security policies and procedures
Answers
B.
Business continuity plan (BCP)
B.
Business continuity plan (BCP)
Answers
C.
Incident communication plan
C.
Incident communication plan
Answers
D.
Incident response training program
D.
Incident response training program
Answers
Suggested answer: C
Total 793 questions
Go to page: of 80