ISACA CISM Exam Practice Questions (P. 2)
- Full Access (1250 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which of the following is the BEST method to protect consumer private information for an online public website?
- AApply strong authentication to online accounts
- BEncrypt consumer data in transit and at restMost Voted
- CUse secure encrypted transport layer
- DApply a masking policy to the consumer data
Correct Answer:
B
B

Absolutely on point! Encrypting consumer data both in transit and at rest truly is your best bet for safeguarding private information on an online public website. This style of encryption acts as a robust layer of defense, ensuring that even if the data is somehow intercepted or illegally accessed, the information stays unreadable. It touches directly on the core objective: keeping user data safe from any unauthorized eyes or breaches, more so than other single-layer methods. Now that’s how you keep consumer data locked down and secure!
send
light_mode
delete
Question #12
Which of the following is the MOST important consideration in a bring your own device (BYOD) program to protect company data in the event of a loss?
- AThe ability to remotely locate devices
- BThe ability to centrally manage devicesMost Voted
- CThe ability to restrict unapproved applications
- DThe ability to classify types of devices
Correct Answer:
B
B

Central management of BYOD devices is fundamental because it enables the enforcement of security policies and actions such as remote wipes or data encryption across all devices. This centralized approach ensures that all personal devices used in the business context comply with the company's security standards, crucial for mitigating risks in case of device loss or theft. This comprehensive control is what makes it a key component of protecting company data within a BYOD framework.
send
light_mode
delete
Question #13
An information security manager has been asked to determine whether an information security initiative has reduced risk to an acceptable level. Which of the following activities would provide the BEST information for the information security manager to draw a conclusion?
- AInitiating a cost-benefit analysis of the implemented controls
- BPerforming a risk assessmentMost Voted
- CReviewing the risk register
- DConducting a business impact analysis (BIA)
Correct Answer:
A
A

The optimal choice here is a cost-benefit analysis (Option A). This type of analysis measures the benefits derived from the implemented controls against the associated costs post-implementation. Essentially, it helps establish whether the decrease in risk, achieved by the security measures, is justified by the costs incurred. This approach not only reflects the outcome in a quantifiable manner but also aligns with practical experiences where assessing the effectiveness of the controls through cost metrics is often more feasible and insightful than redoing risk assessments. This understanding is reinforced by standard methodologies used in evaluating business cases for security initiatives.
send
light_mode
delete
Question #14
An organization that uses external cloud services extensively is concerned with risk monitoring and timely response. The BEST way to address this concern is to ensure:
- Athe availability of continuous technical support.
- Bappropriate service level agreements (SLAs) are in place.
- Ca right-to-audit clause is included in contracts.Most Voted
- Dinternal security standards are in place.
Correct Answer:
C
C

The correct answer, ensuring a right-to-audit clause is included in contracts, effectively addresses the organization's needs for both risk monitoring and timely responses when using external cloud services. This clause empowers the organization to conduct audits and therefore directly assess and verify compliance and risk levels, thereby offering a more comprehensive solution than service level agreements (SLAs), which primarily focus on performance metrics and response times only. This method ensures transparency and facilitates better control over external cloud service risks.
send
light_mode
delete
Question #15
Which of the following is the BEST way to ensure that organizational security policies comply with data security regulatory requirements?
- AObtain annual sign-off from executive management.
- BAlign the policies to the most stringent global regulations.Most Voted
- CSend the policies to stakeholders for review.
- DOutsource compliance activities.
Correct Answer:
B
B

Aligning security policies with the most stringent global regulations indeed sets a high threshold which likely means meeting local data security requirements along the way. This approach serves as a proactive strategy to establish a robust framework, ensuring broad compliance across different regulatory landscapes. Moreover, this approach also offers some flexibility in adopting specific local regulations simultaneously, creating a holistic compliance environment. Although involving stakeholders, as mentioned, is important for nuanced local compliance, aligning globally potentially simplifies compliance management on a larger scale.
send
light_mode
delete
Question #16
The PRIMARY reason for defining the information security roles and responsibilities of staff throughout an organization is to:
- Acomply with security policy.
- Bincrease corporate accountability.
- Cenforce individual accountability.Most Voted
- Dreinforce the need for training.
Correct Answer:
C
C
send
light_mode
delete
Question #17
Threat and vulnerability assessments are important PRIMARILY because they are:
- Aused to establish security investments.
- Bneeded to estimate risk.Most Voted
- Cthe basis for setting control objectives.
- Delements of the organization's security posture.
Correct Answer:
B
B
send
light_mode
delete
Question #18
Which of the following should be an information security managers PRIMARY focus during the development of a critical system storing highly confidential data?
- AEnsuring the amount of residual risk is acceptableMost Voted
- BReducing the number of vulnerabilities detected
- CAvoiding identified system threats
- DComplying with regulatory requirements
Correct Answer:
D
D
send
light_mode
delete
Question #19
When evaluating vendors for sensitive data processing, which of the following should be the FIRST step to ensure the correct level of information security is provided?
- ADevelop metrics for vendor performance.
- BInclude information security criteria as part of vendor selection.Most Voted
- CReview third-party reports of potential vendors.
- DInclude information security clauses in the vendor contract.
Correct Answer:
B
B
send
light_mode
delete
Question #20
An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?
- AFile integrity monitoring (FIM) software
- BSecurity information and event management (SIEM) toolMost Voted
- CIntrusion detection system (IDS)
- DAntivirus software
Correct Answer:
B
B
send
light_mode
delete
All Pages