Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CISM - Certified Information Security Manager

Page: 6 / 15
Total 954 questions

A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?

A.

Perform a backup of the hard drive using backup utilities.

B.

Perform a bit-by-bit backup of the hard disk using a write-blocking device

C.

Perform a backup of the computer using the network

D.

Reboot the system using third-party forensic software in the CD-ROM drive

Security administration efforts will be greatly reduced following the deployment of which of the following techniques?

A.

Discretionary access control

B.

Role-based access control

C.

Access control lists

D.

Distributed access control

Which of the following BEST facilitates the development of a comprehensive information security policy?

A.

Alignment with an established information security framework

B.

An established internal audit program

C.

Security key performance indicators (KPIs)

D.

Areview of recent information security incidents

Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?

A.

Legal

B.

Information security

C.

Help desk

D.

Human resources (HR)

Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?

A.

Risk acceptance by the business has been documented

B.

Teams and individuals responsible for recovery have been identified

C.

Copies of recovery and incident response plans are kept offsite

D.

Incident response and recovery plans are documented in simple language

Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?

A.

Availability of web application firewall logs.

B.

Capability of online virtual machine analysis

C.

Availability of current infrastructure documentation

D.

Capability to take a snapshot of virtual machines

Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?

A.

Each process is assigned to a responsible party.

B.

The contact list is regularly updated.

C.

Minimum regulatory requirements are maintained.

D.

Senior management approval has been documented.

Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?

A.

To alert on unacceptable risk

B.

To identify residual risk

C.

To reassess risk appetite

D.

To benchmark control performance

How does an organization PRIMARILY benefit from the creation of an information security steering committee?

A.

An increase in information security risk awareness

B.

An increased alignment with industry security trends that impact the business

C.

An increased focus on information security resource management

D.

An increased alignment of information security with the business

Of the following, who is BEST suited to own the risk discovered in an application?

A.

Information security manager

B.

Senior management

C.

System owner

D.

Control owner

A financial company executive is concerned about recently increasing cyberattacks and needs to take action to reduce risk. The organization would BEST respond by:

A.

increasing budget and staffing levels for the incident response team.

B.

implementing an intrusion detection system (IDS).

C.

revalidating and mitigating risks to an acceptable level.

D.

testing the business continuity plan (BCP).

To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:

A.

security metrics are included in the service level agreement (SLA).

B.

contract clauses comply with the organization's information security policy.

C.

the information security policy of the third-party service provider is reviewed.

D.

right to audit is included in the service level agreement (SLA).

When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?

A.

Purchase forensic standard operating procedures.

B.

Provide forensics training to the information security team.

C.

Ensure the incident response policy allows hiring a forensics firm.

D.

Retain a forensics firm prior to experiencing an incident.

Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?

A.

Capability maturity model

B.

Vulnerability assessment

C.

IT security risk and exposure

D.

Business impact analysis (BIA)

Information security policies should PRIMARILY reflect alignment with:

A.

an information security framework.

B.

industry best practices.

C.

data security standards.

D.

senior management intent.

An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?

A.

Security requirements are included in the vendor contract

B.

External security audit results are reviewed.

C.

Service level agreements (SLAs) meet operational standards.

D.

Business continuity contingency planning is provided

Who should be responsible for determining the level of data classification required for an application related to a new line of business?

A.

Data analyst

B.

Information security officer (ISO)

C.

Data custodian

D.

Data owners

Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?

A.

Management's business goals and objectives

B.

Strategies of other non-regulated companies

C.

Risk assessment results

D.

Industry best practices and control recommendations

A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:

A.

analysis of current threat landscape.

B.

historical data of reported incidents.

C.

projected return on investment (ROI).

D.

industry benchmarking gap analysis.

A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?

A.

Prevent the user from using personal mobile devices.

B.

Report the incident to the police.

C.

Wipe the device remotely.

D.

Remove user's access to corporate data.