ISACA CISM Exam Practice Questions (P. 5)
- Full Access (1250 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
An organization is concerned with the potential for exploitation of vulnerabilities in its server systems. Which of the following is the BEST control to mitigate the associated risk?
- AEnforcing standard system configurations based on secure configuration benchmarksMost Voted
- BImplementing network and system-based anomaly monitoring software for server systems
- CEnforcing configurations for secure logging and audit trails on server systems
- DImplementing host-based intrusion detection systems (IDS) on server systems
Correct Answer:
A
A
send
light_mode
delete
Question #42
Which of the following is the MOST important step when establishing guidelines for the use of social networking sites in an organization?
- AIdentify secure social networking sites
- BEstablish disciplinary actions for noncompliance
- CPerform a vulnerability assessment
- DDefine acceptable information for postingMost Voted
Correct Answer:
D
D
send
light_mode
delete
Question #43
Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the
BEST way for the information security manager to help senior management understand the related risk?
BEST way for the information security manager to help senior management understand the related risk?
- AInclude the impact of the risk as part of regular metrics.Most Voted
- BSend regular notifications directly to senior managers.
- CRecommend the security steering committee conduct a review.
- DUpdate the risk assessment at regular intervals.
Correct Answer:
A
A
send
light_mode
delete
Question #44
Which of the following BEST prepares a computer incident response team for a variety of information security scenarios?
- ATabletop exercisesMost Voted
- BForensics certification
- CPenetration tests
- DDisaster recovery drills
Correct Answer:
A
A
send
light_mode
delete
Question #45
Which of the following BEST protects against phishing attacks?
- ASecurity strategy training
- BEmail filteringMost Voted
- CNetwork encryption
- DApplication whitelisting
Correct Answer:
A
A
send
light_mode
delete
Question #46
Which of the following is the MOST effective method of preventing deliberate internal security breaches?
- AWell-designed intrusion detection system (IDS)
- BBiometric security access control
- CWell-designed firewall system
- DScreening prospective employeesMost Voted
Correct Answer:
D
D
send
light_mode
delete
Question #47
When designing security controls, it is MOST important to:
- Afocus on preventive controls.
- Bapply controls to confidential information.
- Cevaluate the costs associated with the controls.
- Dapply a risk-based approach.Most Voted
Correct Answer:
C
C
send
light_mode
delete
Question #48
An information security team plans to increase password complexity requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
- AEvaluate business compensating controls.
- BQuantify the security risk to the business.
- CAssess business impact against security risk.Most Voted
- DConduct industry benchmarking.
Correct Answer:
A
A
send
light_mode
delete
Question #49
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
- AReview and update existing security policies.
- BEnforce passwords and data encryption on the devices.Most Voted
- CConduct security awareness training.
- DRequire remote wipe capabilities for devices.
Correct Answer:
A
A
send
light_mode
delete
Question #50
Which of the following would be MOST useful to help senior management understand the status of information security compliance?
- AKey performance indicators (KPIs)Most Voted
- BRisk assessment results
- CIndustry benchmarks
- DBusiness impact analysis (BIA) results
Correct Answer:
A
A
send
light_mode
delete
All Pages