ISACA CISM Exam Practice Questions (P. 4)
- Full Access (1250 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #31
Which of the following is the MOST important incident management consideration for an organization subscribing to a cloud service?
- ADecision on the classification of cloud-hosted data
- BExpertise of personnel providing incident response
- CImplementation of a SIEM in the organization
- DAn agreement on the definition of a security incidentMost Voted
Correct Answer:
D
D
send
light_mode
delete
Question #32
Which of the following is the BEST way for an organization to determine the maturity level of its information security program?
- AReview the results of information security awareness testing.
- BValidate the effectiveness of implemented security controls.
- CBenchmark the information security policy against industry standards.Most Voted
- DTrack the trending of information security incidents.
Correct Answer:
B
B
send
light_mode
delete
Question #33
An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?
- AIncrease the frequency of log monitoring and analysis.
- BImplement a security information and event management system (SIEM).
- CIncrease the sensitivity of intrusion detection systems.
- DImplement multi-factor authentication.Most Voted
Correct Answer:
D
D
send
light_mode
delete
Question #34
When supporting an organization's privacy officer which of the following is the information security manager's PRIMARY role regarding privacy requirements?
- AEnsuring appropriate controls are in placeMost Voted
- BMonitoring the transfer of private data
- CDetermining data classification
- DConducting privacy awareness programs
Correct Answer:
A
A
send
light_mode
delete
Question #35
The chief information security officer (CISO) has developed an information security strategy, but is struggling to obtain senior management commitment for funds to implement the strategy. Which of the following is the MOST likely reason?
- AThe strategy does not include a cost-benefit analysis.
- BThere was a lack of engagement with the business during development.Most Voted
- CThe strategy does not comply with security standards.
- DThe CISO reports to the CIO.
Correct Answer:
B
B
send
light_mode
delete
Question #36
An organization's CIO has tasked the information security manager with drafting the charter for an information security steering committee. The committee will be comprised of the CIO, the IT shared services manager, the vice president of marketing, and the information security manager. Which of the following is the MOST significant issue with the development of this committee?
- AThe committee consists of too many senior executives.
- BThe committee lacks sufficient business representation.Most Voted
- CThere is a conflict of interest between the business and IT.
- DThe CIO is not taking charge of the committee.
Correct Answer:
B
B
send
light_mode
delete
Question #37
What is the PRIMARY purpose of an unannounced disaster recovery exercise?
- ATo provide metrics to senior management
- BTo evaluate how personnel react to the situationMost Voted
- CTo assess service level agreements (SLAs)
- DTo estimate the recovery time objective (RTO)
Correct Answer:
B
B
send
light_mode
delete
Question #38
Labeling information according to its security classification:
- Areduces the need to identify baseline controls for each classification.
- Breduces the number and type of countermeasures required.
- Cenhances the likelihood of people handling information securely.Most Voted
- Daffects the consequences if information is handled insecurely.
Correct Answer:
C
C
send
light_mode
delete
Question #39
Which of the following is the MOST effective approach for determining whether an organization's information security program supports the information security strategy?
- AEnsure resources meet information security program needs
- BAudit the information security program to identify deficiencies
- CIdentify gaps impacting information security strategy
- DDevelop key performance indicators (KPIs) of information securityMost Voted
Correct Answer:
D
D
send
light_mode
delete
Question #40
When drafting the corporate privacy statement for a public web site, which of the following MUST be included?
- ALimited liability clause
- BAccess control requirements
- CExplanation of information usageMost Voted
- DInformation encryption requirements
Correct Answer:
C
C
send
light_mode
delete
All Pages