Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CISM - Certified Information Security Manager

Page: 12 / 15
Total 954 questions

Embedding security responsibilities into job descriptions is important PRIMARILY because it:

A.

supports access management.

B.

simplifies development of the security awareness program.

C.

aligns security to the human resources (HR) function.

D.

strengthens employee accountability.

To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?

A.

Request the service provider comply with information security policy.

B.

Review a recent independent audit report of the service provider.

C.

Assess the level of security awareness of the service provider.

D.

Review samples of service level reports from the service provider.

An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?

A.

Present a diagram of core Zero Trust logical components to help visualize the architectural changes

B.

Summarize the training plan and end user feedback in an internal portal and send the link to the board

C.

Prepare a report on the Zero Trust implementation that includes a status dashboard and timeline

D.

Provide an outline of the business impact in terms of risk reduction and changes in user experience

A PRIMARY purpose of creating security policies is to:

A.

define allowable security boundaries.

B.

communicate management's security expectations.

C.

establish the way security tasks should be executed.

D.

implement management's security governance strategy.

Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?

A.

The risks are entered in the organization's risk register.

B.

The risks are reported to the business unit's senior management.

C.

The risks are escalated to the IT department for remediation.

D.

The risks are communicated to the central risk function.

Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?

A.

Integrity

B.

Authenticity

C.

Confidentiality

D.

Nonrepudiation

Which of the following is MOST important when responding to a major security incident?

A.

Contacting forensic investigators

B.

Following the escalation process

C.

Notifying law enforcement

D.

Identifying the indicators of compromise

An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:

• A bad actor broke into a business-critical FTP server by brute forcing an administrative password

• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored

• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server

• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail

Which of the following could have been prevented by conducting regular incident response testing?

A.

Ignored alert messages

B.

The server being compromised

C.

The brute force attack

D.

Stolen data

Which of the following should be the PRIMARY basis for determining the value of assets?

A.

Cost of replacing the assets

B.

Business cost when assets are not available

C.

Original cost of the assets minus depreciation

D.

Total cost of ownership (TCO)

Which of the following would MOST effectively ensure that a new server is appropriately secured?

A.

Performing secure code reviews

B.

Enforcing technical security standards

C.

Conducting penetration testing

D.

Initiating security scanning

An organization has suffered from a large-scale security event impacting a critical system. Following the decision to restore the system at an alternate location, which plan should be invoked?

A.

Disaster recovery plan (DRP)

B.

Incident response plan

C.

Business continuity plan (BCP)

D.

Communications plan

Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?

A.

Disaster recovery plan (DRP)

B.

Incident notification plan

C.

Risk response scenarios

D.

Security procedures

Which of the following is MOST likely to reduce the effectiveness of a SIEM system?

A.

Lack of multi-factor authentication (MFA) for system access

B.

Weakly encrypted log files

C.

Misconfiguration of alert thresholds

D.

Complex user interface

When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:

A.

the integrity of evidence is preserved.

B.

forensic investigation software is loaded on the server.

C.

the incident is reported to senior management.

D.

the server is unplugged from power.

When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?

A.

Risk owner

B.

Control owner

C.

Business system owner

D.

Application owner

The results of a risk assessment for a potential network reconfiguration reveal a high likelihood of sensitive data being compromised. What is the information security manager's BEST course of

action?

A.

Recommend additional network segmentation.

B.

Seek an independent opinion to confirm the findings.

C.

Determine alignment with existing regulations.

D.

Report findings to key stakeholders.

An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?

A.

Feedback from the vendor's previous clients

B.

Alignment of the vendor's business objectives with enterprise security goals

C.

The maturity of the vendor's internal control environment

D.

Penetration testing against the vendor's network

In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?

A.

Revise the policy.

B.

Perform a root cause analysis.

C.

Conduct a risk assessment,

D.

Communicate the acceptable use policy.

Which of the following is the BEST evidence of alignment between corporate and information security governance?

A.

Security key performance indicators (KPIs)

B.

Project resource optimization

C.

Regular security policy reviews

D.

Senior management sponsorship

Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?

A.

Determine the final root cause of the incident.

B.

Remove all instances of the incident from the network.

C.

Mitigate exploited vulnerabilities to prevent future incidents.

D.

Isolate affected systems to prevent the spread of damage.