Isaca CISM - Certified Information Security Manager
Embedding security responsibilities into job descriptions is important PRIMARILY because it:
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
A PRIMARY purpose of creating security policies is to:
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?
Which of the following is MOST important when responding to a major security incident?
An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
• A bad actor broke into a business-critical FTP server by brute forcing an administrative password
• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
Which of the following should be the PRIMARY basis for determining the value of assets?
Which of the following would MOST effectively ensure that a new server is appropriately secured?
An organization has suffered from a large-scale security event impacting a critical system. Following the decision to restore the system at an alternate location, which plan should be invoked?
Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?
Which of the following is MOST likely to reduce the effectiveness of a SIEM system?
When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:
When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?
The results of a risk assessment for a potential network reconfiguration reveal a high likelihood of sensitive data being compromised. What is the information security manager's BEST course of
action?
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
Which of the following is the BEST evidence of alignment between corporate and information security governance?
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?