ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 75

Question list
Search
Search

Which of the following should be the PRIMARY goal of information security?

A.
Information management
A.
Information management
Answers
B.
Regulatory compliance
B.
Regulatory compliance
Answers
C.
Data governance
C.
Data governance
Answers
D.
Business alignment
D.
Business alignment
Answers
Suggested answer: D

An experienced information security manager joins a new organization and begins by conducting an audit of all key IT processes. Which of the following findings about the vulnerability management program should be of GREATEST concern?

A.
Identified vulnerabilities are not published and communicated in awareness programs.
A.
Identified vulnerabilities are not published and communicated in awareness programs.
Answers
B.
Identified vulnerabilities are not logged and resolved in a timely manner.
B.
Identified vulnerabilities are not logged and resolved in a timely manner.
Answers
C.
The number of vulnerabilities identified exceeds industry benchmarks. D. Vulnerabilities are identified by internal staff rather than by external consultants.
C.
The number of vulnerabilities identified exceeds industry benchmarks. D. Vulnerabilities are identified by internal staff rather than by external consultants.
Answers
Suggested answer: B

A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:

A.
analysis of current threat landscape.
A.
analysis of current threat landscape.
Answers
B.
historical data of reported incidents.
B.
historical data of reported incidents.
Answers
C.
projected return on investment (ROI).
C.
projected return on investment (ROI).
Answers
D.
industry benchmarking gap analysis.
D.
industry benchmarking gap analysis.
Answers
Suggested answer: C

Which of the following is a PRIMARY function of an incident response team?

A.
To provide effective incident mitigation
A.
To provide effective incident mitigation
Answers
B.
To provide a risk assessment for zero-day vulnerabilities
B.
To provide a risk assessment for zero-day vulnerabilities
Answers
C.
To provide a single point of contact for critical incidents
C.
To provide a single point of contact for critical incidents
Answers
D.
To provide a business impact analysis (BIA)
D.
To provide a business impact analysis (BIA)
Answers
Suggested answer: A

The PRIMARY goal of a post-incident review should be to:

A.
establish the cost of the incident to the business.
A.
establish the cost of the incident to the business.
Answers
B.
determine why the incident occurred.
B.
determine why the incident occurred.
Answers
C.
identify policy changes to prevent a recurrence.
C.
identify policy changes to prevent a recurrence.
Answers
D.
determine how to improve the incident handling process.
D.
determine how to improve the incident handling process.
Answers
Suggested answer: D

Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?

A.
Labeling of data may help to ensure data is assigned to the correct cloud type.
A.
Labeling of data may help to ensure data is assigned to the correct cloud type.
Answers
B.
Laws and regulations of the origin country may not be applicable.
B.
Laws and regulations of the origin country may not be applicable.
Answers
C.
There may be liabilities and penalties in the event of a security breach.
C.
There may be liabilities and penalties in the event of a security breach.
Answers
D.
Data may be stored in unknown locations and may not be easily retrievable.
D.
Data may be stored in unknown locations and may not be easily retrievable.
Answers
Suggested answer: B

When remote access is granted to a company's internal network, the MOST important consideration should be that access is provided:

A.
on a need-to-know basis subject to controls.
A.
on a need-to-know basis subject to controls.
Answers
B.
subject to legal and regulatory requirements.
B.
subject to legal and regulatory requirements.
Answers
C.
by the use of a remote access server.
C.
by the use of a remote access server.
Answers
D.
if a robust IT infrastructure exists.
D.
if a robust IT infrastructure exists.
Answers
Suggested answer: A

Which of the following is MOST important to the effectiveness of an information security steering committee?

A.
The committee has strong regulatory knowledge.
A.
The committee has strong regulatory knowledge.
Answers
B.
The committee is comprised of representatives from senior management.
B.
The committee is comprised of representatives from senior management.
Answers
C.
The committee has cross-organizational representation.
C.
The committee has cross-organizational representation.
Answers
D.
The committee uses a risk management framework.
D.
The committee uses a risk management framework.
Answers
Suggested answer: C

The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:

A.
scope of the business continuity program.
A.
scope of the business continuity program.
Answers
B.
resources needed for business recovery.
B.
resources needed for business recovery.
Answers
C.
recovery time objective (RTO).
C.
recovery time objective (RTO).
Answers
D.
scope of the incident response plan.
D.
scope of the incident response plan.
Answers
Suggested answer: B

After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:

A.
determine the potential impact.
A.
determine the potential impact.
Answers
B.
reevaluate the standards.
B.
reevaluate the standards.
Answers
C.
implement compensating controls.
C.
implement compensating controls.
Answers
D.
evaluate the cost of replacing the applications.
D.
evaluate the cost of replacing the applications.
Answers
Suggested answer: A
Total 793 questions
Go to page: of 80