Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CISM - Certified Information Security Manager

Page: 9 / 15
Total 954 questions

For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?

A.

Centralized logging

B.

Time clock synchronization

C.

Available forensic tools

D.

Administrator log access

Which of the following is the MOST important consideration when defining control objectives?

A.

Senior management support

B.

Risk appetite

C.

Threat environment

D.

Budget allocation

Which of the following should be done FIRST after a ransomware incident has been successfully contained?

A.

Notify relevant stakeholders.

B.

Conduct forensic analysis.

C.

Perform lessons learned.

D.

Restore impacted systems.

Which of the following is the PRIMARY responsibility of the information security function when an organization adopts emerging technologies?

A.

Developing security training for the new technologies

B.

Designing new security controls

C.

Creating an acceptable use policy for the technologies

D.

Assessing the potential security risk

Which of the following should an information security manager do FIRST after a new cybersecunty regulation has been introduced?

A.

Conduct a cost-benefit analysis.

B.

Consult corporate legal counsel

C.

Update the information security policy.

D.

Perform a gap analysis.

Which of the following is MOST important for guiding the development and management of a comprehensive information security program?

A.

Adopting information security program management best practices

B.

Implementing policies and procedures to address the information security strategy

C.

Aligning the organization's business objectives with IT objectives

D.

Establishing and maintaining an information security governance framework

Which of the following will BEST facilitate the integration of information security governance into enterprise governance?

A.

Developing an information security policy based on risk assessments

B.

Establishing an information security steering committee

C.

Documenting the information security governance framework

D.

Implementing an information security awareness program

A risk owner has accepted a large amount of risk due to the high cost of controls. Which of the following should be the information security manager's PRIMARY focus in this situation?

A.

Establishing a strong ongoing risk monitoring process

B.

Presenting the risk profile for approval by the risk owner

C.

Conducting an independent review of risk responses

D.

Updating the information security standards to include the accepted risk

Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?

A.

Revise the procurement process.

B.

Update the change management process.

C.

Discuss the issue with senior leadership.

D.

Remove the application from production.

Which of the following is the MOST important outcome of a post-incident review?

A.

The impact of the incident is reported to senior management.

B.

The system affected by the incident is restored to its prior state.

C.

The person responsible for the incident is identified.

D.

The root cause of the incident is determined.

Which of the following should be done FIRST when implementing a security program?

A.

Perform a risk analysis

B.

Implement data encryption.

C.

Create an information asset inventory.

D.

Determine the value of information assets.

Which of the following should be done FIRST when a SIEM flags a potential event?

A.

Validate the event is not a false positive.

B.

Initiate the incident response plan.

C.

Escalate the event to the business owner.

D.

Implement compensating controls.

The PRIMARY goal of the eradication phase in an incident response process is to:

A.

maintain a strict chain of custody.

B.

provide effective triage and containment of the incident.

C.

remove the threat and restore affected systems

D.

obtain forensic evidence from the affected system.

After logging in to a web application, additional authentication is checked at various application points. Which of the following is the PRIMARY reason for such an approach?

A.

To ensure access rights meet classification requirements

B.

To facilitate the analysis of application logs

C.

To ensure web application availability

D.

To support strong two-factor authentication protocols

An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?

A.

Reinforce security awareness practices for end users.

B.

Temporarily outsource the email system to a cloud provider.

C.

Develop a business case to replace the system.

D.

Monitor outgoing traffic on the firewall.

The PRIMARY purpose of vulnerability identification is to:

A.

Remediate vulnerabilities before they are exploited

B.

Discover control deficiencies

C.

Provide vulnerability identifiers for risk reporting

D.

Prioritize vulnerability remediation

Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?

A.

Statistical reports will be incorrect.

B.

The service desk will be staffed incorrectly.

C.

Escalation procedures will be ineffective.

D.

Timely detection of attacks will be impossible.

Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?

A.

Presenting evidence of inherent risk

B.

Reporting the security maturity level

C.

Presenting compliance requirements

D.

Communicating the residual risk

Which of the following is MOST important in increasing the effectiveness of incident responders?

A.

Communicating with the management team

B.

Integrating staff with the IT department

C.

Testing response scenarios

D.

Reviewing the incident response plan annually

Which of the following is MOST important when designing an information security governance framework?

A.

Aligning with the information security strategy

B.

Assessing the availability of information security resources

C.

Aligning with industry best practice frameworks

D.

Assessing the current state of information security