Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CISM - Certified Information Security Manager

Page: 10 / 15
Total 954 questions

Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?

A.

Communicate disciplinary processes for policy violations.

B.

Require staff to participate in information security awareness training.

C.

Require staff to sign confidentiality agreements.

D.

Include information security responsibilities in job descriptions.

An organization's HR department requires that employee account privileges be removed from all corporate IT systems within three days of termination to comply with a government regulation However, the systems all have different user directories, and it currently takes up to four weeks to remove the privileges Which of the following would BEST enable regulatory compliance?

A.

Multi-factor authentication (MFA) system

B.

Identity and access management (IAM) system

C.

Privileged access management (PAM) system

D.

Governance, risk, and compliance (GRC) system

A finance department director has decided to outsource the organization's budget application and has identified potential providers. Which of the following actions should be initiated FIRST by IN information security manager?

A.

Determine the required security controls for the new solution

B.

Review the disaster recovery plans (DRPs) of the providers

C.

Obtain audit reports on the service providers' hosting environment

D.

Align the roles of the organization's and the service providers' stats.

Which of the following defines the triggers within a business continuity plan (BCP)? @

A.

Needs of the organization

B.

Disaster recovery plan (DRP)

C.

Information security policy

D.

Gap analysis

Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?

A.

Defining information stewardship roles

B.

Defining security asset categorization

C.

Assigning information asset ownership

D.

Developing a records retention schedule

Which of the following is the PRIMARY purpose of an acceptable use policy?

A.

To provide steps for carrying out security-related procedures

B.

To facilitate enforcement of security process workflows

C.

To protect the organization from misuse of information assets

D.

To provide minimum security baselines for information assets

Which of the following is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?

A.

To compare emerging trends with the existing organizational security posture

B.

To communicate worst-case scenarios to senior management

C.

To train information security professionals to mitigate new threats

D.

To determine opportunities for expanding organizational information security

Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?

A.

The plan is reviewed by senior and IT operational management.

B.

The plan is based on industry best practices.

C.

Process steps are documented by the disaster recovery team.

D.

Procedures are available at the primary and failover location.

Which of the following should be done FIRST when developing a business continuity plan (BCP)?

A.

Review current recovery policies.

B.

Define the organizational strategy.

C.

Prioritize the critical processes.

D.

Review existing cyber insurance coverage.

Network isolation techniques are immediately implemented after a security breach to:

A.

preserve evidence as required for forensics

B.

reduce the extent of further damage.

C.

allow time for key stakeholder decision making.

D.

enforce zero trust architecture principles.

Of the following, whose input is of GREATEST importance in the development of an information security strategy?

A.

Process owners

B.

End users

C.

Security architects.

D.

Corporate auditors

Which of the following should have the MOST influence on the development of information security policies?

A.

Business strategy

B.

Past and current threats

C.

IT security framework

D.

Industry standards

Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?

A.

Decrease in the number of security incidents

B.

Increase in the frequency of security incident escalations

C.

Reduction in the impact of security incidents

D.

Increase in the number of reported security incidents

Management decisions concerning information security investments will be MOST effective when they are based on:

A.

a process for identifying and analyzing threats and vulnerabilities.

B.

an annual loss expectancy (ALE) determined from the history of security events,

C.

the reporting of consistent and periodic assessments of risks.

D.

the formalized acceptance of risk analysis by management,

An organization is in the process of defining policies for employee use of social media. It is MOST important for the information security manager to:

A.

Assign accountability for monitoring social media

B.

Identify security monitoring tools

C.

Evaluate risks to the organization

D.

Develop security awareness training

A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?

A.

Right of the subscriber to conduct onsite audits of the vendor

B.

Escrow of software code with conditions for code release

C.

Authority of the subscriber to approve access to its data

D.

Commingling of subscribers' data on the same physical server

A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?

A.

Ensure a risk assessment is performed to evaluate the findings

B.

Ensure vulnerabilities found are resolved within acceptable timeframes

C.

Request funding needed to resolve the top vulnerabilities

D.

Report findings to senior management

Which of the following is MOST important to determine following the discovery and eradication of a malware attack?

A.

The malware entry path

B.

The creator of the malware

C.

The type of malware involved

D.

The method of detecting the malware

Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?

A.

Include the impact of the risk as part of regular metrics.

B.

Recommend the security steering committee conduct a review.

C.

Update the risk assessment at regular intervals

D.

Send regular notifications directly to senior managers

Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?

A.

Clearer segregation of duties

B.

Increased user productivity

C.

Increased accountability

D.

Fewer security incidents