ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 77

Question list
Search
Search

List of questions

Search

Once a suite of security controls has been successfully implemented for an organization's business units, it is MOST important for the information security manager to:

A.
hand over the controls to the relevant business owners.
A.
hand over the controls to the relevant business owners.
Answers
B.
ensure the controls are regularly tested for ongoing effectiveness.
B.
ensure the controls are regularly tested for ongoing effectiveness.
Answers
C.
perform testing to compare control performance against industry levels.
C.
perform testing to compare control performance against industry levels.
Answers
D.
prepare to adapt the controls for future system upgrades.
D.
prepare to adapt the controls for future system upgrades.
Answers
Suggested answer: B

Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?

A.
Control matrix
A.
Control matrix
Answers
B.
Business impact analysis (BIA)
B.
Business impact analysis (BIA)
Answers
C.
Risk register
C.
Risk register
Answers
D.
Information security policy
D.
Information security policy
Answers
Suggested answer: D

Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?

A.
Enforcing data retention
A.
Enforcing data retention
Answers
B.
Developing policy standards
B.
Developing policy standards
Answers
C.
Benchmarking against industry peers
C.
Benchmarking against industry peers
Answers
D.
Categorizing information assets
D.
Categorizing information assets
Answers
Suggested answer: C

An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?

A.
IT strategy
A.
IT strategy
Answers
B.
Security architecture
B.
Security architecture
Answers
C.
Business case
C.
Business case
Answers
D.
Risk assessment
D.
Risk assessment
Answers
Suggested answer: C

Which of the following is the GREATEST benefit of performing a tabletop exercise of the business continuity plan (BCP)?

A.
It identifies appropriate follow-up work to address shortcomings in the plan.
A.
It identifies appropriate follow-up work to address shortcomings in the plan.
Answers
B.
It allows for greater participation and planning from the business side.
B.
It allows for greater participation and planning from the business side.
Answers
C.
It helps in assessing the availability of compatible backup hardware.
C.
It helps in assessing the availability of compatible backup hardware.
Answers
D.
It provides a low-cost method of assessing the BCP's completeness.
D.
It provides a low-cost method of assessing the BCP's completeness.
Answers
Suggested answer: A

Which of the following is MOST helpful in determining whether a phishing email is malicious?

A.
Security awareness training
A.
Security awareness training
Answers
B.
Reverse engineering
B.
Reverse engineering
Answers
C.
Threat intelligence
C.
Threat intelligence
Answers
D.
Sandboxing
D.
Sandboxing
Answers
Suggested answer: D

Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?

A.
Implement a mobile device policy and standard.
A.
Implement a mobile device policy and standard.
Answers
B.
Provide employee training on secure mobile device practices.
B.
Provide employee training on secure mobile device practices.
Answers
C.
Implement a mobile device management (MDM) solution.
C.
Implement a mobile device management (MDM) solution.
Answers
D.
Require employees to install an effective anti-malware app.
D.
Require employees to install an effective anti-malware app.
Answers
Suggested answer: B

Which of the following is the MOST important reason to document information security incidents that are reported across the organization?

A.
Evaluate the security posture of the organization.
A.
Evaluate the security posture of the organization.
Answers
B.
Identify unmitigated risk.
B.
Identify unmitigated risk.
Answers
C.
Prevent incident recurrence.
C.
Prevent incident recurrence.
Answers
D.
Support business investments in security.
D.
Support business investments in security.
Answers
Suggested answer: C

A financial institution is planning to develop a new mobile application. Which of the following is the BEST time to begin assessments of the application's security compliance?

A.
During user acceptance testing (UAT)
A.
During user acceptance testing (UAT)
Answers
B.
During the design phase
B.
During the design phase
Answers
C.
During static code analysis
C.
During static code analysis
Answers
D.
During regulatory review
D.
During regulatory review
Answers
Suggested answer: B

Which of the following BEST enables an incident response team to determine appropriate actions during an initial investigation?

A.
Feedback from affected departments
A.
Feedback from affected departments
Answers
B.
Historical data from past incidents
B.
Historical data from past incidents
Answers
C.
Technical capabilities of the team
C.
Technical capabilities of the team
Answers
D.
Procedures for incident triage
D.
Procedures for incident triage
Answers
Suggested answer: D
Total 793 questions
Go to page: of 80