ISACA CISM Exam Practice Questions (P. 3)
- Full Access (1250 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Over the last year, an information security manager has performed risk assessments on multiple third-party vendors. Which of the following criteria would be
MOST helpful in determining the associated level of risk applied to each vendor?
MOST helpful in determining the associated level of risk applied to each vendor?
- ACompliance requirements associated with the regulation
- BCriticality of the service to the organizationMost Voted
- CCorresponding breaches associated with each vendor
- DCompensating controls in place to protect information security
Correct Answer:
B
B
send
light_mode
delete
Question #22
Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?
- ASecurity audit reports
- BRecovery time objective (RTO)
- CTechnological capabilities
- DEscalation processesMost Voted
Correct Answer:
D
D
send
light_mode
delete
Question #23
Executive leadership has decided to engage a consulting firm to develop and implement a comprehensive security framework for the organization to allow senior management to remain focused on business priorities. Which of the following poses the GREATEST challenge to the successful implementation of the new security governance framework?
- AExecutive leadership becomes involved in decisions about information security governance.
- BExecutive leadership views information security governance primarily as a concern of the information security management teamMost Voted
- CInformation security staff has little or no experience with the practice of information security governance.
- DInformation security management does not fully accept the responsibility for information security governance.
Correct Answer:
B
B
send
light_mode
delete
Question #24
Risk scenarios simplify the risk assessment process by:
- Acovering the full range of possible risk.
- Bensuring business risk is mitigated.
- Creducing the need for subsequent risk evaluation.
- Dfocusing on important and relevant risk.Most Voted
Correct Answer:
D
D
send
light_mode
delete
Question #25
Which of the following is the MOST important consideration when developing information security objectives?
- AThey are regularly reassessed and reported to stakeholders
- BThey are approved by the IT governance function
- CThey are clear and can be understood by stakeholdersMost Voted
- DThey are identified using global security frameworks and standards
Correct Answer:
C
C
send
light_mode
delete
Question #26
A legacy application does not comply with new regulatory requirements to encrypt sensitive data at rest, and remediating this issue would require significant investment. What should the information security manager do FIRST?
- AAssess the business impact to the organization.Most Voted
- BPresent the noncompliance risk to senior management.
- CInvestigate alternative options to remediate the noncompliance.
- DDetermine the cost to remediate the noncompliance.
Correct Answer:
A
A
send
light_mode
delete
Question #27
Which of the following BEST enables effective information security governance?
- ASecurity-aware corporate cultureMost Voted
- BAdvanced security technologies
- CPeriodic vulnerability assessments
- DEstablished information security metrics
Correct Answer:
A
A
send
light_mode
delete
Question #28
Application data integrity risk is MOST directly addressed by a design that includes.
- Astrict application of an authorized data dictionary.
- Breconciliation routines such as checksums, hash totals, and record counts.Most Voted
- Capplication log requirements such as field-level audit trails and user activity logs.
- Daccess control technologies such as role-based entitlements.
Correct Answer:
B
B
send
light_mode
delete
Question #29
Deciding the level of protection a particular asset should be given is BEST determined by:
- Athe corporate risk appetite.Most Voted
- Ba risk analysis.
- Ca threat assessment.
- Da vulnerability assessment.
Correct Answer:
B
B
send
light_mode
delete
Question #30
What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?
- ACalculate the total cost of ownership (TCO).
- BDefine the issues to be addressed.Most Voted
- CPerform a cost-benefit analysis.
- DConduct a feasibility study.
Correct Answer:
C
C
send
light_mode
delete
All Pages