Weekend Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > Isaca Certification > CISM

CISM Certified Information Security Manager Question and Answers

Question # 4

When choosing the best controls to mitigate risk to acceptable levels, the information security manager's decision should be MAINLY driven by:

A.

best practices.

B.

control framework

C.

regulatory requirements.

D.

cost-benefit analysis,

Full Access
Question # 5

Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?

A.

A capability and maturity assessment

B.

Detailed analysis of security program KPIs

C.

An information security dashboard

D.

An information security risk register

Full Access
Question # 6

Which of the following activities MUST be performed by an information security manager for change requests?

A.

Perform penetration testing on affected systems.

B.

Scan IT systems for operating system vulnerabilities.

C.

Review change in business requirements for information security.

D.

Assess impact on information security risk.

Full Access
Question # 7

Which of the following is MOST helpful for protecting an enterprise from advanced persistent threats (APTs)?

A.

Updated security policies

B.

Defined security standards

C.

Threat intelligence

D.

Regular antivirus updates

Full Access
Question # 8

A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?

A.

Instruct the vendor to conduct penetration testing.

B.

Suspend the connection to the application in the firewall

C.

Report the situation to the business owner of the application.

D.

Initiate the organization's incident response process.

Full Access
Question # 9

Which of the following should be the PRIMARY area of focus when mitigating security risks associated with emerging technologies?

A.

Compatibility with legacy systems

B.

Application of corporate hardening standards

C.

Integration with existing access controls

D.

Unknown vulnerabilities

Full Access
Question # 10

Which of the following BEST supports information security management in the event of organizational changes in security personnel?

A.

Formalizing a security strategy and program

B.

Developing an awareness program for staff

C.

Ensuring current documentation of security processes

D.

Establishing processes within the security operations team

Full Access
Question # 11

Information security controls should be designed PRIMARILY based on:

A.

a business impact analysis (BIA).

B.

regulatory requirements.

C.

business risk scenarios,

D.

a vulnerability assessment.

Full Access
Question # 12

How does an incident response team BEST leverage the results of a business impact analysis (BIA)?

A.

Assigning restoration priority during incidents

B.

Determining total cost of ownership (TCO)

C.

Evaluating vendors critical to business recovery

D.

Calculating residual risk after the incident recovery phase

Full Access
Question # 13

The PRIMARY benefit of introducing a single point of administration in network monitoring is that it:

A.

reduces unauthorized access to systems.

B.

promotes efficiency in control of the environment.

C.

prevents inconsistencies in information in the distributed environment.

D.

allows administrative staff to make management decisions.

Full Access
Question # 14

Which of the following BEST indicates that information security governance and corporate governance are integrated?

A.

The information security team is aware of business goals.

B.

The board is regularly informed of information security key performance indicators (KPIs),

C.

The information security steering committee is composed of business leaders.

D.

A cost-benefit analysis is conducted on all information security initiatives.

Full Access
Question # 15

Which of the following is the BEST evidence of alignment between corporate and information security governance?

A.

Security key performance indicators (KPIs)

B.

Project resource optimization

C.

Regular security policy reviews

D.

Senior management sponsorship

Full Access
Question # 16

Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?

A.

To alert on unacceptable risk

B.

To identify residual risk

C.

To reassess risk appetite

D.

To benchmark control performance

Full Access
Question # 17

An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?

A.

Conduct user awareness training within the IT function.

B.

Propose that IT update information security policies and procedures.

C.

Determine the risk related to noncompliance with the policy.

D.

Request that internal audit conduct a review of the policy development process,

Full Access
Question # 18

If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:

A.

contact law enforcement.

B.

document the chain of custody.

C.

capture evidence using standard server-backup utilities.

D.

reboot affected machines in a secure area to search for evidence.

Full Access
Question # 19

Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?

A.

Security risk analysis

B.

Gap assessment

C.

Maturity assessment

D.

Vulnerability scan report

Full Access
Question # 20

Which of the following is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?

A.

To compare emerging trends with the existing organizational security posture

B.

To communicate worst-case scenarios to senior management

C.

To train information security professionals to mitigate new threats

D.

To determine opportunities for expanding organizational information security

Full Access
Question # 21

IT projects have gone over budget with too many security controls being added post-production. Which of the following would MOST help to ensure that relevant controls are applied to a project?

A.

Involving information security at each stage of project management

B.

Identifying responsibilities during the project business case analysis

C.

Creating a data classification framework and providing it to stakeholders

D.

Providing stakeholders with minimum information security requirements

Full Access
Question # 22

Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?

A.

Number of blocked intrusion attempts

B.

Number of business cases reviewed by senior management

C.

Trends in the number of identified threats to the business

D.

Percentage of controls integrated into business processes

Full Access
Question # 23

An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?

A.

Scan the entire application using a vulnerability scanning tool.

B.

Run the application from a high-privileged account on a test system.

C.

Perform security code reviews on the entire application.

D.

Monitor Internet traffic for sensitive information leakage.

Full Access
Question # 24

Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?

A.

Establish key risk indicators (KRIs).

B.

Use quantitative risk assessment methods.

C.

Provide regular reporting on risk treatment to senior management

D.

Require steering committee approval of risk treatment plans.

Full Access
Question # 25

Which of the following is MOST helpful for determining which information security policies should be implemented by an organization?

A.

Risk assessment

B.

Business impact analysis (BIA)

C.

Vulnerability assessment

D.

Industry best practices

Full Access
Question # 26

Which of the following is MOST important in increasing the effectiveness of incident responders?

A.

Communicating with the management team

B.

Integrating staff with the IT department

C.

Testing response scenarios

D.

Reviewing the incident response plan annually

Full Access
Question # 27

Which of the following is MOST effective in monitoring an organization's existing risk?

A.

Periodic updates to risk register

B.

Risk management dashboards

C.

Security information and event management (SIEM) systems

D.

Vulnerability assessment results

Full Access
Question # 28

Which of the following will BEST facilitate the integration of information security governance into enterprise governance?

A.

Developing an information security policy based on risk assessments

B.

Establishing an information security steering committee

C.

Documenting the information security governance framework

D.

Implementing an information security awareness program

Full Access
Question # 29

When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?

A.

Data is encrypted in transit and at rest at the vendor site.

B.

Data is subject to regular access log review.

C.

The vendor must be able to amend data.

D.

The vendor must agree to the organization's information security policy,

Full Access
Question # 30

Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?

A.

Threat management is enhanced.

B.

Compliance status is improved.

C.

Security metrics are enhanced.

D.

Proactive risk management is facilitated.

Full Access
Question # 31

An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?

A.

Determine whether the organization can benefit from adopting the new standard.

B.

Obtain legal counsel's opinion on the standard's applicability to regulations,

C.

Perform a risk assessment on the new technology.

D.

Review industry specialists’ analyses of the new standard.

Full Access
Question # 32

An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?

A.

Definition of when a disaster should be declared

B.

Requirements for regularly testing backups

C.

Recovery time objectives (RTOs)

D.

The disaster recovery communication plan

Full Access
Question # 33

Which of the following activities is designed to handle a control failure that leads to a breach?

A.

Risk assessment

B.

Incident management

C.

Root cause analysis

D.

Vulnerability management

Full Access
Question # 34

A recovery point objective (RPO) is required in which of the following?

A.

Disaster recovery plan (DRP)

B.

Information security plan

C.

Incident response plan

D.

Business continuity plan (BCP)

Full Access
Question # 35

Which of the following should be done FIRST when establishing a new data protection program that must comply with applicable data privacy regulations?

A.

Evaluate privacy technologies required for data protection.

B.

Encrypt all personal data stored on systems and networks.

C.

Update disciplinary processes to address privacy violations.

D.

Create an inventory of systems where personal data is stored.

Full Access
Question # 36

When investigating an information security incident, details of the incident should be shared:

A.

widely to demonstrate positive intent.

B.

only with management.

C.

only as needed,

D.

only with internal audit.

Full Access
Question # 37

Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?

A.

To identify the organization's risk tolerance

B.

To improve security processes

C.

To align security roles and responsibilities

D.

To optimize security risk management

Full Access
Question # 38

Which of the following BEST enables staff acceptance of information security policies?

A.

Strong senior management support

B.

Gomputer-based training

C.

Arobust incident response program

D.

Adequate security funding

Full Access
Question # 39

The BEST way to identify the risk associated with a social engineering attack is to:

A.

monitor the intrusion detection system (IDS),

B.

review single sign-on (SSO) authentication lags.

C.

test user knowledge of information security practices.

D.

perform a business risk assessment of the email filtering system.

Full Access
Question # 40

Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?

A.

Review the previous risk assessment and countermeasures.

B.

Perform a new risk assessment,

C.

Evaluate countermeasures to mitigate new risks.

D.

Transfer the new risk to a third party.

Full Access
Question # 41

Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?

A.

Availability of web application firewall logs.

B.

Capability of online virtual machine analysis

C.

Availability of current infrastructure documentation

D.

Capability to take a snapshot of virtual machines

Full Access
Question # 42

Which of the following is the MOST important factor of a successful information security program?

A.

The program follows industry best practices.

B.

The program is based on a well-developed strategy.

C.

The program is cost-efficient and within budget,

D.

The program is focused on risk management.

Full Access
Question # 43

Which of the following will result in the MOST accurate controls assessment?

A.

Mature change management processes

B.

Senior management support

C.

Well-defined security policies

D.

Unannounced testing

Full Access
Question # 44

Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?

A.

Defining information stewardship roles

B.

Defining security asset categorization

C.

Assigning information asset ownership

D.

Developing a records retention schedule

Full Access
Question # 45

Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?

A.

Metrics to drive the information security program

B.

Information security policies

C.

A defined security organizational structure

D.

An information security strategy

Full Access
Question # 46

Which of the following is a desired outcome of information security governance?

A.

Penetration test

B.

Improved risk management

C.

Business agility

D.

A maturity model

Full Access
Question # 47

Which of the following is MOST important for building 4 robust information security culture within an organization?

A.

Mature information security awareness training across the organization

B.

Strict enforcement of employee compliance with organizational security policies

C.

Security controls embedded within the development and operation of the IT environment

D.

Senior management approval of information security policies

Full Access
Question # 48

Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?

A.

Walk-through of the incident response plan

B.

Black box penetration test

C.

Simulated phishing exercise

D.

Red team exercise

Full Access
Question # 49

Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?

A.

Providing ongoing training to the incident response team

B.

Implementing proactive systems monitoring

C.

Implementing a honeypot environment

D.

Updating information security awareness materials

Full Access
Question # 50

Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?

A.

Compromise of critical assets via third-party resources

B.

Unavailability of services provided by a supplier

C.

Loss of customers due to unavailability of products

D.

Unreliable delivery of hardware and software resources by a supplier

Full Access
Question # 51

Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?

A.

Disaster recovery plan (DRP)

B.

Incident response plan

C.

Business continuity plan (BCP)

D.

Business contingency plan

Full Access
Question # 52

When properly implemented, secure transmission protocols protect transactions:

A.

from eavesdropping.

B.

from denial of service (DoS) attacks.

C.

on the client desktop.

D.

in the server's database.

Full Access
Question # 53

The effectiveness of an information security governance framework will BEST be enhanced if:

A.

consultants review the information security governance framework.

B.

a culture of legal and regulatory compliance is promoted by management.

C.

risk management is built into operational and strategic activities.

D.

IS auditors are empowered to evaluate governance activities

Full Access
Question # 54

An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?

A.

Identification of risk

B.

Analysis of control gaps

C.

Design of key risk indicators (KRIs)

D.

Selection of risk treatment options

Full Access
Question # 55

Which of the following BEST ensures information security governance is aligned with corporate governance?

A.

A security steering committee including IT representation

B.

A consistent risk management approach

C.

An information security risk register

D.

Integration of security reporting into corporate reporting

Full Access
Question # 56

Security administration efforts will be greatly reduced following the deployment of which of the following techniques?

A.

Discretionary access control

B.

Role-based access control

C.

Access control lists

D.

Distributed access control

Full Access
Question # 57

Which of the following is the MOST important criterion when deciding whether to accept residual risk?

A.

Cost of replacing the asset

B.

Cost of additional mitigation

C.

Annual loss expectancy (ALE)

D.

Annual rate of occurrence

Full Access
Question # 58

Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?

A.

Communicate disciplinary processes for policy violations.

B.

Require staff to participate in information security awareness training.

C.

Require staff to sign confidentiality agreements.

D.

Include information security responsibilities in job descriptions.

Full Access
Question # 59

An information security manager developing an incident response plan MUST ensure it includes:

A.

an inventory of critical data.

B.

criteria for escalation.

C.

a business impact analysis (BIA).

D.

critical infrastructure diagrams.

Full Access
Question # 60

During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?

A.

Post-incident review

B.

Eradication

C.

Containment

D.

Identification

Full Access
Question # 61

An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?

A.

Determine which country's information security regulations will be used.

B.

Merge the two existing information security programs.

C.

Apply the existing information security program to the acquired company.

D.

Evaluate the information security laws that apply to the acquired company.

Full Access
Question # 62

Which of the following is the PRIMARY reason for granting a security exception?

A.

The risk is justified by the cost to the business.

B.

The risk is justified by the benefit to security.

C.

The risk is justified by the cost to security.

D.

The risk is justified by the benefit to the business.

Full Access
Question # 63

An organization is increasingly using Software as a Service (SaaS) to replace in-house hosting and support of IT applications. Which of the following would be the MOST effective way to help ensure procurement decisions consider information security concerns?

A.

Integrate information security risk assessments into the procurement process.

B.

Provide regular information security training to the procurement team.

C.

Invite IT members into regular procurement team meetings to influence best practice.

D.

Enforce the right to audit in procurement contracts with SaaS vendors.

Full Access
Question # 64

Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?

A.

Security policy

B.

Risk management framework

C.

Risk appetite

D.

Security standards

Full Access
Question # 65

Which of the following is the BEST indicator of an organization's information security status?

A.

Intrusion detection log analysis

B.

Controls audit

C.

Threat analysis

D.

Penetration test

Full Access
Question # 66

An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?

A.

Responsible entities

B.

Key risk indicators (KRIS)

C.

Compensating controls

D.

Potential business impact

Full Access
Question # 67

What is the BEST way to reduce the impact of a successful ransomware attack?

A.

Perform frequent backups and store them offline.

B.

Purchase or renew cyber insurance policies.

C.

Include provisions to pay ransoms ih the information security budget.

D.

Monitor the network and provide alerts on intrusions.

Full Access
Question # 68

An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?

A.

Risk levels may be elevated beyond acceptable limits.

B.

Security audits may report more high-risk findings.

C.

The compensating controls may not be cost efficient.

D.

Noncompliance with industry best practices may result.

Full Access
Question # 69

Which of the following parties should be responsible for determining access levels to an application that processes client information?

A.

The business client

B.

The information security tear

C.

The identity and access management team

D.

Business unit management

Full Access
Question # 70

Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?

A.

Threat management is enhanced.

B.

Compliance status is improved.

C.

Security metrics are enhanced.

D.

Proactive risk management is facilitated.

Full Access
Question # 71

An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?

A.

Create a business case for a new incident response plan.

B.

Revise the existing incident response plan.

C.

Conduct a gap analysis.

D.

Assess the impact to the budget,

Full Access
Question # 72

Which of the following is MOST important to consider when determining asset valuation?

A.

Asset recovery cost

B.

Asset classification level

C.

Cost of insurance premiums

D.

Potential business loss

Full Access
Question # 73

Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?

A.

Collect additional metrics.

B.

Perform a cost-benefit analysis.

C.

Submit funding request to senior management.

D.

Begin due diligence on the outsourcing company.

Full Access
Question # 74

Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?

A.

Increase the frequency of system backups.

B.

Review the mitigating security controls.

C.

Notify staff members of the threat.

D.

Assess the risk to the organization.

Full Access
Question # 75

An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:

A.

the chief risk officer (CRO).

B.

business senior management.

C.

the information security manager.

D.

the compliance officer.

Full Access
Question # 76

Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?

A.

Execute a risk treatment plan.

B.

Review contracts and statements of work (SOWs) with vendors.

C.

Implement data regionalization controls.

D.

Determine current and desired state of controls.

Full Access
Question # 77

A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?

A.

The time and location that the breach occurred

B.

Evidence of previous incidents caused by the user

C.

The underlying reason for the user error

D.

Appropriate disciplinary procedures for user error

Full Access
Question # 78

Which of the following tasks should be performed once a disaster recovery plan (DRP) has been developed?

A.

Develop the test plan.

B.

Analyze the business impact.

C.

Define response team roles.

D.

Identify recovery time objectives (RTOs).

Full Access
Question # 79

In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:

A.

evaluate results of the most recent incident response test.

B.

review the number of reported security incidents.

C.

ensure established security metrics are reported.

D.

assess progress of risk mitigation efforts.

Full Access
Question # 80

Which of the following is the PRIMARY preventive method to mitigate risks associated with privileged accounts?

A.

Eliminate privileged accounts.

B.

Perform periodic certification of access to privileged accounts.

C.

Frequently monitor activities on privileged accounts.

D.

Provide privileged account access only to users who need it.

Full Access
Question # 81

In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:

A.

change activities are documented.

B.

the rationale for acceptance is periodically reviewed.

C.

the acceptance is aligned with business strategy.

D.

compliance with the risk acceptance framework.

Full Access
Question # 82

Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?

A.

Create a security exception.

B.

Perform a gap analysis to determine needed resources.

C.

Perform a vulnerability assessment.

D.

Assess the risk to business operations.

Full Access
Question # 83

An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?

A.

The number of blocked external attacks is not representative of the true threat profile.

B.

The number of blocked external attacks will vary by month, causing inconsistent graphs.

C.

The number of blocked external attacks is an indicator of the organization's popularity.

D.

The number of blocked external attacks over time does not explain the attackers' motivations.

Full Access
Question # 84

Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?

A.

Enforcing data retention

B.

Developing policy standards

C.

Benchmarking against industry peers

D.

Categorizing information assets

Full Access
Question # 85

An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?

A.

Perform a business impact analysis (BIA).

B.

Notify local law enforcement agencies of a breach.

C.

Activate the incident response program.

D.

Validate the risk to the organization.

Full Access
Question # 86

When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:

A.

the integrity of evidence is preserved.

B.

forensic investigation software is loaded on the server.

C.

the incident is reported to senior management.

D.

the server is unplugged from power.

Full Access
Question # 87

Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?

A.

Implement a data loss prevention (DLP) system

B.

Disable all incoming cloud mail services

C.

Conduct awareness training across the organization

D.

Require acknowledgment of the acceptable use policy

Full Access
Question # 88

Which of the following is MOST important for the improvement of a business continuity plan (BCP)?

A.

Incorporating lessons learned

B.

Implementing an IT resilience solution

C.

Implementing management reviews

D.

Documenting critical business processes

Full Access
Question # 89

Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?

A.

Legal

B.

Information security

C.

Help desk

D.

Human resources (HR)

Full Access
Question # 90

When integrating security risk management into an organization it is MOST important to ensure:

A.

business units approve the risk management methodology.

B.

the risk treatment process is defined.

C.

information security policies are documented and understood.

D.

the risk management methodology follows an established framework.

Full Access
Question # 91

An organization is performing due diligence when selecting a third party. Which of the following is MOST helpful to reduce the risk of unauthorized sharing of information during this process?

A.

Using secure communication channels

B.

Establishing mutual non-disclosure agreements (NDAs)

C.

Requiring third-party privacy policies

D.

Obtaining industry references

Full Access
Question # 92

Which of the following is MOST important to the successful implementation of an information security program?

A.

Adequate security resources are allocated to the program.

B.

Key performance indicators (KPIs) are defined.

C.

A balanced scorecard is approved by the steering committee.

D.

The program is developed using global security standards.

Full Access
Question # 93

Which of the following is the BEST indicator of an emerging incident?

A.

A weakness identified within an organization's information systems

B.

Customer complaints about lack of website availability

C.

A recent security incident at an industry competitor

D.

Attempted patching of systems resulting in errors

Full Access
Question # 94

An online trading company discovers that a network attack has penetrated the firewall. What should be the information security manager's FIRST response?

A.

Notify the regulatory agency of the incident.

B.

Implement mitigating controls.

C.

Evaluate the impact to the business.

D.

Examine firewall logs to identify the attacker.

Full Access
Question # 95

The categorization of incidents is MOST important for evaluating which of the following?

A.

Appropriate communication channels

B.

Allocation of needed resources

C.

Risk severity and incident priority

D.

Response and containment requirements

Full Access
Question # 96

Which of the following is the BEST indication of an effective disaster recovery planning process?

A.

Hot sites are required for any declared disaster.

B.

Chain of custody is maintained throughout the disaster recovery process.

C.

Post-incident reviews are conducted after each event.

D.

Recovery time objectives (RTOs) are shorter than recovery point objectives (RPOs).

Full Access
Question # 97

Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?

A.

Conduct a business impact analysis (BIA)

B.

Identify the response and recovery learns.

C.

Review the communications plan.

D.

Develop response and recovery strategies.

Full Access
Question # 98

Which is MOST important to identify when developing an effective information security strategy?

A.

Security awareness training needs

B.

Potential savings resulting from security governance

C.

Business assets to be secured

D.

Residual risk levels

Full Access
Question # 99

An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?

A.

Benchmark the processes with best practice to identify gaps.

B.

Calculate the return on investment (ROI).

C.

Provide security awareness training to HR.

D.

Assess the business objectives of the processes.

Full Access
Question # 100

To effectively manage an organization's information security risk, it is MOST important to:

A.

assign risk management responsibility to an experienced consultant.

B.

periodically identify and correct new systems vulnerabilities.

C.

establish and communicate risk tolerance.

D.

benchmark risk scenarios against peer organizations.

Full Access
Question # 101

In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?

A.

Maturity of the security policy

B.

Clarity of security roles and responsibilities

C.

Corporate culture

D.

Corporate risk framework

Full Access
Question # 102

What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?

A.

Developing a dashboard for communicating the metrics

B.

Agreeing on baseline values for the metrics

C.

Benchmarking the expected value of the metrics against industry standards

D.

Aligning the metrics with the organizational culture

Full Access
Question # 103

How would the information security program BEST support the adoption of emerging technologies?

A.

Conducting a control assessment

B.

Developing an emerging technology roadmap

C.

Providing effective risk governance

D.

Developing an acceptable use policy

Full Access
Question # 104

When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?

A.

Managing the impact

B.

Identifying unacceptable risk levels

C.

Assessing vulnerabilities

D.

Evaluating potential threats

Full Access
Question # 105

Which of the following is the MOST effective defense against malicious insiders compromising confidential information?

A.

Regular audits of access controls

B.

Strong background checks when hiring staff

C.

Prompt termination procedures

D.

Role-based access control (RBAC)

Full Access
Question # 106

Which of the following is the BEST indicator of the maturity level of a vendor risk management process?

A.

Average time required to complete the vendor risk management process

B.

Percentage of vendors that have gone through the vendor onboarding process

C.

Percentage of vendors that are regularly reviewed against defined criteria

D.

Number of vendors rejected because of security review results

Full Access
Question # 107

Who is accountable for approving an information security governance framework?

A.

The board of directors

B.

The chief information security officer (ClSO)

C.

The enterprise risk committee

D.

The chief information officer (CIO)

Full Access
Question # 108

Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?

A.

Business impact analysis (BIA)

B.

Risk register

C.

Penetration testing

D.

Vulnerability assessment

Full Access
Question # 109

Which type of recovery site is MOST reliable and can support stringent recovery requirements?

A.

Cold site

B.

Warm site

C.

Hot site

D.

Mobile site

Full Access
Question # 110

Which of the following should be triggered FIRST when unknown malware has infected an organization's critical system?

A.

Incident response plan

B.

Disaster recovery plan (DRP)

C.

Business continuity plan (BCP)

D.

Vulnerability management plan

Full Access
Question # 111

Which of the following is the MOST important characteristic of an effective information security metric?

A.

The metric expresses residual risk relative to risk tolerance.

B.

The metric is frequently reported to senior management.

C.

The metric directly maps to an industry risk management framework.

D.

The metric compares the organization's inherent risk against its risk appetite.

Full Access
Question # 112

Which of the following is the PRIMARY benefit of an information security awareness training program?

A.

Influencing human behavior

B.

Evaluating organizational security culture

C.

Defining risk accountability

D.

Enforcing security policy

Full Access
Question # 113

An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?

A.

Guidelines

B.

Policies

C.

Procedures

D.

Standards

Full Access
Question # 114

Which of the following BEST enables the assignment of risk and control ownership?

A.

Aligning to an industry-recognized control framework

B.

Adopting a risk management framework

C.

Obtaining senior management buy-in

D.

Developing an information security strategy

Full Access
Question # 115

Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?

A.

Impact of service interruption

B.

Results of recovery testing

C.

Determination of recovery point objective (RPO)

D.

Direction from senior management

Full Access
Question # 116

Which of the following is MOST important to consider when defining control objectives?

A.

Industry best practices

B.

An information security framework

C.

Control recommendations from a recent audit

D.

The organization's risk appetite

Full Access
Question # 117

Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?

A.

Escalation processes

B.

Recovery time objective (RTO)

C.

Security audit reports

D.

Technological capabilities

Full Access
Question # 118

Which of the following is the BEST starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities?

A.

Controls analysis

B.

Emerging risk review

C.

Penetration testing

D.

Traffic monitoring

Full Access
Question # 119

Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?

A.

Risk assessment

B.

Business impact analysis (BIA)

C.

Penetration test results

D.

Vulnerability scan results

Full Access
Question # 120

To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?

A.

Gap analysis results

B.

Level of residual risk

C.

Level of risk treatment

D.

Configuration parameters

Full Access
Question # 121

Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?

A.

Compartmentalization

B.

Overlapping redundancy

C.

Continuous monitoring

D.

Multi-factor authentication

Full Access
Question # 122

A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?

A.

Automate user provisioning activities.

B.

Maintain strict control over user provisioning activities.

C.

Formally document IT administrator activities.

D.

Implement monitoring of IT administrator activities.

Full Access
Question # 123

Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?

A.

Perform a patch update.

B.

Conduct a risk assessment.

C.

Perform a penetration test.

D.

Conduct an impact assessment.

Full Access
Question # 124

Which of the following is the MOST effective way to address an organizations security concerns during contract negotiations with a third party?

A.

Ensure security is involved in the procurement process.

B.

Review the third-party contract with the organization's legal department.

C.

Conduct an information security audit on the third-party vendor.

D.

Communicate security policy with the third-party vendor.

Full Access
Question # 125

After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?

A.

Eradication

B Recovery

B.

Lessons learned review

C.

Incident declaration

Full Access
Question # 126

Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.

Which of the following should be the PRIMARY focus of Company A's information security manager?

A.

Company B's security policies

B.

The cost to align to Company A's security policies

C.

Company A's security architecture

D.

The organizational structure of Company B

Full Access
Question # 127

Which of the following is the MOST important outcome of a post-incident review?

A.

The impact of the incident is reported to senior management.

B.

The system affected by the incident is restored to its prior state.

C.

The person responsible for the incident is identified.

D.

The root cause of the incident is determined.

Full Access
Question # 128

Which of the following is MOST important when defining how an information security budget should be allocated?

A.

Regulatory compliance standards

B.

Information security strategy

C.

Information security policy

D.

Business impact assessment

Full Access
Question # 129

What should an information security manager verify FIRST when reviewing an information asset management program?

A.

System owners have been identified.

B.

Key applications have been secured.

C.

Information assets have been classified.

D.

Information assets have been inventoried.

Full Access
Question # 130

The information security manager of a multinational organization has been asked to consolidate the information security policies of its regional locations. Which of the following would be of

GREATEST concern?

A.

Varying threat environments

B.

Disparate reporting lines

C.

Conflicting legal requirements

D.

Differences in work culture

Full Access
Question # 131

Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?

A.

Assess changes in the risk profile.

B.

Activate the disaster recovery plan (DRP).

C.

Invoke the incident response plan.

D.

Conduct security awareness training.

Full Access
Question # 132

Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?

A.

Alignment with financial reporting

B.

Alignment with business initiatives

C.

Alignment with industry frameworks

D.

Alignment with risk appetite

Full Access
Question # 133

A penetration test against an organization's external web application shows several vulnerabilities. Which of the following presents the GREATEST concern?

A.

A rules of engagement form was not signed prior to the penetration test

B.

Vulnerabilities were not found by internal tests

C.

Vulnerabilities were caused by insufficient user acceptance testing (UAT)

D.

Exploit code for one of the vulnerabilities is publicly available

Full Access
Question # 134

The MOST useful technique for maintaining management support for the information security program is:

A.

informing management about the security of business operations.

B.

implementing a comprehensive security awareness and training program.

C.

identifying the risks and consequences of failure to comply with standards.

D.

benchmarking the security programs of comparable organizations.

Full Access
Question # 135

Which of the following would BEST enable the timely execution of an incident response plan?

A.

The introduction of a decision support tool

B.

Definition of trigger events

C.

Clearly defined data classification process

D.

Centralized service desk

Full Access
Question # 136

An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?

A.

Wipe the affected system.

B.

Notify internal legal counsel.

C.

Notify senior management.

D.

Isolate the impacted endpoints.

Full Access
Question # 137

A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?

A.

Mitigate

B.

Accept

C.

Transfer

D.

Avoid

Full Access
Question # 138

Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?

A.

To improve awareness of information security

B.

To disclose the root cause of the incident

C.

To increase goodwill toward the organization

D.

To comply with regulations regarding notification

Full Access
Question # 139

Which of the following is MOST important when developing an information security strategy?

A.

Engage stakeholders.

B.

Assign data ownership.

C.

Determine information types.

D.

Classify information assets.

Full Access
Question # 140

While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?

A.

The test is scheduled to reduce operational impact.

B.

The test involves IT members in the test process.

C.

The test addresses the critical components.

D.

The test simulates actual prime-time processing conditions.

Full Access
Question # 141

Which of the following should be done NEXT following senior management's decision to comply with new personal data regulations that are much more stringent than those currently followed to avoid massive fines?

A.

Encrypt data in transit and at rest.

B.

Complete a return on investment (ROI) analysis.

C.

Create and implement a data minimization plan.

D.

Conduct a gap analysis.

Full Access
Question # 142

Which of the following is MOST important to have in place for an organization's information security program to be effective?

A.

Documented information security processes

B.

A comprehensive IT strategy

C.

Senior management support

D.

Defined and allocated budget

Full Access
Question # 143

After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?

A.

Calculating cost of the incident

B.

Conducting a postmortem assessment

C.

Performing an impact analysis

D.

Preserving the evidence

Full Access
Question # 144

What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?

A.

Define the issues to be addressed.

B.

Perform a cost-benefit analysis.

C.

Calculate the total cost of ownership (TCO).

D.

Conduct a feasibility study.

Full Access
Question # 145

Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?

A.

Requiring an external security audit of the IT service provider

B.

Requiring regular reporting from the IT service provider

C.

Defining information security requirements with internal IT

D.

Defining the business recovery plan with the IT service provider

Full Access
Question # 146

The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:

A.

)the information security officer.

B.

the steering committee.

C.

the board of directors.

D.

the internal audit manager.

Full Access
Question # 147

Which of the following is the BEST approach for data owners to use when defining access privileges for users?

    Define access privileges based on user roles.

    Adopt user account settings recommended by the vendor.

    Perform a risk assessment of the users' access privileges.

A.

Implement an identity and access management (IDM) tool.

Full Access
Question # 148

Which of the following is the MOST important reason for logging firewall activity?

A.

Metrics reporting

B.

Firewall tuning

C.

Intrusion prevention

D.

Incident investigation

Full Access
Question # 149

A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?

A.

Authority of the subscriber to approve access to its data

B.

Right of the subscriber to conduct onsite audits of the vendor

C.

Commingling of subscribers' data on the same physical server

D.

Escrow of software code with conditions for code release

Full Access
Question # 150

Which of the following should be done FIRST when developing a business continuity plan (BCP)?

A.

Review current recovery policies.

B.

Define the organizational strategy.

C.

Prioritize the critical processes.

D.

Review existing cyber insurance coverage.

Full Access
Question # 151

Which of the following is the MOST effective way to detect security incidents?

A.

Analyze recent security risk assessments.

B.

Analyze security anomalies.

C.

Analyze penetration test results.

D.

Analyze vulnerability assessments.

Full Access
Question # 152

Which of the following events is MOST likely to require an organization to revisit its information security framework?

A.

New services offered by IT

B.

Changes to the risk landscape

C.

A recent cybersecurity attack

D.

A new technology implemented

Full Access
Question # 153

Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?

A.

Protection of business value and assets

B.

Identification of core business strategies

C, Easier entrance into new businesses and technologies

C.

Improved regulatory compliance posture

Full Access
Question # 154

An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:

A.

determine the security exposures.

B.

assess the ability to integrate the security department operations.

C.

ensure compliance with international standards.

D.

evaluate the security policy and standards.

Full Access
Question # 155

Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?

A.

The plan is reviewed by senior and IT operational management.

B.

The plan is based on industry best practices.

C.

Process steps are documented by the disaster recovery team.

D.

Procedures are available at the primary and failover location.

Full Access
Question # 156

Which of the following BEST helps to enable the desired information security culture within an organization?

A.

Information security awareness training and campaigns

B.

Effective information security policies and procedures

C.

Delegation of information security roles and responsibilities

D.

Incentives for appropriate information security-related behavior

Full Access
Question # 157

What should a global information security manager do FIRST when informed that a new regulation with significant impact will go into effect soon?

A.

Perform a privacy impact assessment (PIA).

B.

Perform a vulnerability assessment.

C.

Perform a gap analysis.

D.

Perform a business impact analysis (BIA).

Full Access
Question # 158

Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?

A.

Inform the public relations officer.

B.

Inform customers of the breach.

C.

Invoke the incident response plan.

D.

Monitor the third party's response.

Full Access
Question # 159

Which of the following processes is MOST important for the success of a business continuity plan (BCP)?

A.

Involving all stakeholders in testing and training

B.

Scheduling periodic internal and external audits

C.

Including the board and senior management in plan reviews

D.

Maintaining copies of the plan at the primary and recovery sites

Full Access
Question # 160

Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?

A.

Disaster recovery plan (DRP)

B.

Incident notification plan

C.

Risk response scenarios

D.

Security procedures

Full Access
Question # 161

Which of the following will ensure confidentiality of content when accessing an email system over the Internet?

A.

Multi-factor authentication

B.

Digital encryption

C.

Data masking

D.

Digital signatures

Full Access
Question # 162

Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?

A.

Clearer segregation of duties

B.

Increased user productivity

C.

Increased accountability

D.

Fewer security incidents

Full Access
Question # 163

Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?

A.

Embedding compliance requirements within operational processes

B.

Engaging external experts to provide guidance on changes in compliance requirements

C.

Performing periodic audits for compliance with legal and regulatory requirements

D.

Assigning the operations manager accountability for meeting compliance requirements

Full Access
Question # 164

Which of the following is the BEST course of action when an online company discovers a network attack in progress?

A.

Dump all event logs to removable media

B.

Isolate the affected network segment

C.

Enable trace logging on ail events

D.

Shut off all network access points

Full Access
Question # 165

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

A.

Wipe and reset the endpoint device.

B.

Isolate the endpoint device.

C.

Power off the endpoint device.

D.

Run a virus scan on the endpoint device.

Full Access
Question # 166

Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?

A.

Ability to monitor and control incident management costs

B.

More visibility to the impact of disruptions

C.

Effective protection of information assets

D.

Optimized allocation of recovery resources

Full Access
Question # 167

Which of the following is the GREATEST benefit of information asset classification?

A.

Helping to determine the recovery point objective (RPO)

B.

Providing a basis for implementing a need-to-know policy

C.

Supporting segregation of duties

D.

Defining resource ownership

Full Access
Question # 168

When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security incident is that it helps to:

A.

the incident response process to stakeholders

B.

adequately staff and train incident response teams.

C.

develop effective escalation and response procedures.

D.

make tabletop testing more effective.

Full Access
Question # 169

Which of the following has the MOST influence on the inherent risk of an information asset?

A.

Risk tolerance

B.

Net present value (NPV)

C.

Return on investment (ROI)

D.

Business criticality

Full Access
Question # 170

A newly appointed information security manager of a retailer with multiple stores discovers an HVAC (heating, ventilation, and air conditioning) vendor has remote access to the stores to enable real-time monitoring and equipment diagnostics. Which of the following should be the information security manager's FIRST course of action?

A.

Conduct a penetration test of the vendor.

B.

Review the vendor's technical security controls

C.

Review the vendor contract

D.

Disconnect the real-time access

Full Access
Question # 171

An organization's quality process can BEST support security management by providing:

A.

security configuration controls.

B.

assurance that security requirements are met.

C.

guidance for security strategy.

D.

a repository for security systems documentation.

Full Access
Question # 172

A Seat a-hosting organization's data center houses servers, appli

BEST approach for developing a physical access control policy for the organization?

A.

Review customers’ security policies.

B.

Conduct a risk assessment to determine security risks and mitigating controls.

C.

Develop access control requirements for each system and application.

D.

Design single sign-on (SSO) or federated access.

Full Access
Question # 173

Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?

A.

Performing penetration tests against the network to demonstrate business vulnerability

B.

Highlighting competitor performance regarding network best security practices

C.

Demonstrating that targeted security controls tie to business objectives

D.

Presenting comparable security implementation estimates from several vendors

Full Access
Question # 174

Which of the following backup methods requires the MOST time to restore data for an application?

A.

Full backup

B.

Incremental

C.

Differential

D.

Disk mirroring

Full Access
Question # 175

Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?

A.

Require remote wipe capabilities for devices.

B.

Conduct security awareness training.

C.

Review and update existing security policies.

D.

Enforce passwords and data encryption on the devices.

Full Access
Question # 176

An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?

A.

The benefit is greater than the potential risk.

B.

USB storage devices are enabled based on user roles.

C.

Users accept the risk of noncompliance.

D.

Access is restricted to read-only.

Full Access
Question # 177

Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?

A.

Skills required for the incident response team

B.

A list of external resources to assist with incidents

C.

Service level agreements (SLAs)

D.

A detailed incident notification process

Full Access
Question # 178

Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?

A.

Monitor the effectiveness of controls

B.

Update the risk assessment framework

C.

Review the inherent risk level

D.

Review the risk probability and impact

Full Access
Question # 179

The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?

A.

Inform senior management

B.

Re-evaluate the risk

C.

Implement compensating controls

D.

Ask the business owner for the new remediation plan

Full Access
Question # 180

Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?

A.

Providing training from third-party forensics firms

B.

Obtaining industry certifications for the response team

C.

Conducting tabletop exercises appropriate for the organization

D.

Documenting multiple scenarios for the organization and response steps

Full Access
Question # 181

The PRIMARY objective of a post-incident review of an information security incident is to:

A.

update the risk profile

B.

minimize impact

C.

prevent recurrence.

D.

determine the impact

Full Access
Question # 182

Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?

A.

Patch management files

B.

Network system logs

C.

Configuration management files

D.

Intrusion detection system (IDS) logs

Full Access
Question # 183

When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?

A.

The information security strategy

B.

Losses due to security incidents

C.

The results of a risk assessment

D.

Security investment trends in the industry

Full Access
Question # 184

Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?

A.

Verify that information security requirements are included in the contract.

B.

Request customer references from the vendor.

C.

Require vendors to complete information security questionnaires.

D.

Review the results of the vendor's independent control reports.

Full Access
Question # 185

An information security manager determines there are a significant number of exceptions to a newly released industry-required security standard. Which of the following should be done NEXT?

A.

Document risk acceptances.

B.

Revise the organization's security policy.

C.

Assess the consequences of noncompliance.

D.

Conduct an information security audit.

Full Access
Question # 186

What is the PRIMARY objective of performing a vulnerability assessment following a business system update?

A.

Determine operational losses.

B.

Improve the change control process.

C.

Update the threat landscape.

D.

Review the effectiveness of controls

Full Access
Question # 187

Which of the following defines the triggers within a business continuity plan (BCP)? @

A.

Needs of the organization

B.

Disaster recovery plan (DRP)

C.

Information security policy

D.

Gap analysis

Full Access
Question # 188

An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?

A.

Conduct an information security audit.

B.

Validate the relevance of the information.

C.

Perform a gap analysis.

D.

Inform senior management

Full Access
Question # 189

Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?

A.

Legal and regulatory requirements

B.

Likelihood of a disaster

C.

Organizational tolerance to service interruption

D.

Geographical location of the backup site

Full Access
Question # 190

Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?

A.

Host patching

B.

Penetration testing

C.

Infrastructure hardening

D.

Data classification

Full Access
Question # 191

Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?

A.

Consult with IT staff and assess the risk based on their recommendations

B.

Update the security policy based on the regulatory requirements

C.

Propose relevant controls to ensure the business complies with the regulation

D.

Identify and assess the risk in the context of business objectives

Full Access
Question # 192

What is the PRIMARY benefit to an organization when information security program requirements are aligned with employment and staffing processes?

A.

Security incident reporting procedures are followed.

B.

Security staff turnover is reduced.

C.

Information assets are classified appropriately.

D.

Access is granted based on task requirements.

Full Access
Question # 193

When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?

A.

External consultant

B.

Information owners

C.

Information security manager

D.

Business continuity coordinator

Full Access
Question # 194

Which of the following should be given the HIGHEST priority during an information security post-incident review?

A.

Documenting actions taken in sufficient detail

B.

Updating key risk indicators (KRIs)

C.

Evaluating the performance of incident response team members

D.

Evaluating incident response effectiveness

Full Access
Question # 195

Which of the following analyses will BEST identify the external influences to an organization's information security?

A.

Business impact analysis (BIA)

B.

Gap analysis

C.

Threat analysis

D.

Vulnerability analysis

Full Access
Question # 196

The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:

A.

the organization has the required funds to implement the plan.

B.

compliance with legal and regulatory requirements.

C.

staff participation in information security efforts.

D.

the plan aligns with corporate governance.

Full Access
Question # 197

To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:

A.

rely on senior management to enforce security.

B.

promote the relevance and contribution of security.

C.

focus on compliance.

D.

reiterate the necessity of security.

Full Access
Question # 198

A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?

A.

Ensure a risk assessment is performed to evaluate the findings

B.

Ensure vulnerabilities found are resolved within acceptable timeframes

C.

Request funding needed to resolve the top vulnerabilities

D.

Report findings to senior management

Full Access
Question # 199

The PRIMARY purpose for continuous monitoring of security controls is to ensure:

A.

control gaps are minimized.

B.

system availability.

C.

effectiveness of controls.

D.

alignment with compliance requirements.

Full Access
Question # 200

An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?

A.

Refer the issue to internal audit for a recommendation.

B.

Re-classify the data and increase the security level to meet business risk.

C.

Instruct the relevant system owners to reclassify the data.

D.

Complete a risk assessment and refer the results to the data owners.

Full Access
Question # 201

Which of the following roles is BEST able to influence the security culture within an organization?

A.

Chief information security officer (CISO)

B.

Chief information officer (CIO)

C.

Chief executive officer (CEO)

D.

Chief operating officer (COO)

Full Access
Question # 202

Which of the following documents should contain the INITIAL prioritization of recovery of services?

A.

IT risk analysis

B.

Threat assessment

C.

Business impact analysis (BIA)

D.

Business process map

Full Access
Question # 203

A balanced scorecard MOST effectively enables information security:

A.

project management

B.

governance.

C.

performance.

D.

risk management.

Full Access
Question # 204

Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?

A.

Impact on information security program

B.

Cost of controls

C.

Impact to business function

D.

Cost to replace

Full Access
Question # 205

Which of the following is the BEST method to ensure compliance with password standards?

A.

Implementing password-synchronization software

B.

Using password-cracking software

C.

Automated enforcement of password syntax rules

D.

A user-awareness program

Full Access
Question # 206

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

A.

Wipe and reset the endpoint device.

B.

Isolate the endpoint device.

C.

Power off the endpoint device.

D.

Run a virus scan on the endpoint device.

Full Access
Question # 207

Which of the following is the PRIMARY objective of a business impact analysis (BIA)?

A.

Determine recovery priorities.

B.

Define the recovery point objective (RPO).

C.

Confirm control effectiveness.

D.

Analyze vulnerabilities.

Full Access
Question # 208

Which of the following should be the MOST important consideration of business continuity management?

A.

Ensuring human safety

B.

Identifying critical business processes

C.

Ensuring the reliability of backup data

D.

Securing critical information assets

Full Access
Question # 209

Recovery time objectives (RTOs) are BEST determined by:

A.

business managers

B.

business continuity officers

C.

executive management

D.

database administrators (DBAs).

Full Access
Question # 210

Which of the following is a PRIMARY benefit of managed security solutions?

A.

Wider range of capabilities

B.

Easier implementation across an organization

C.

Greater ability to focus on core business operations

D.

Lower cost of operations

Full Access
Question # 211

Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?

A.

Containment

B.

Recovery

C.

Eradication

D.

Identification

Full Access
Question # 212

Which of the following is the MOST critical factor for information security program success?

A.

comprehensive risk assessment program for information security

B.

The information security manager's knowledge of the business

C.

Security staff with appropriate training and adequate resources

D.

Ongoing audits and addressing open items

Full Access
Question # 213

An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?

A.

Initiate incident response.

B.

Disable remote

C.

Initiate a device reset.

D.

Conduct a risk assessment.

Full Access
Question # 214

An organization is aligning its incident response capability with a public cloud service provider. What should be the information security manager's FIRST course of action?

A.

Identify the skill set of the provider's incident response team.

B.

Evaluate the provider's audit logging and monitoring controls.

C.

Review the provider’s incident definitions and notification criteria.

D.

Update the incident escalation process.

Full Access
Question # 215

Which of the following is an example of risk mitigation?

A.

Purchasing insurance

B.

Discontinuing the activity associated with the risk

C.

Improving security controls

D.

Performing a cost-benefit analysis

Full Access
Question # 216

Threat and vulnerability assessments are important PRIMARILY because they are:

A.

used to establish security investments

B.

the basis for setting control objectives.

C.

elements of the organization's security posture.

D.

needed to estimate risk.

Full Access
Question # 217

Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?

A.

Maintaining a repository base of security policies

B.

Measuring impact of exploits on business processes

C.

Facilitating the monitoring of risk occurrences

D.

Redirecting event logs to an alternate location for business continuity plan

Full Access
Question # 218

Which of the following should be the FIRST step in developing an information security strategy?

A.

Determine acceptable levels of information security risk

B.

Create a roadmap to identify security baselines and controls

C.

Perform a gap analysis based on the current state

D.

Identify key stakeholders to champion information security

Full Access
Question # 219

An organization faces severe fines and penalties if not in compliance with local regulatory requirements by an established deadline. Senior management has asked the information security manager to prepare an action plan to achieve compliance.

Which of the following would provide the MOST useful information for planning purposes? »

A.

Results from a business impact analysis (BIA)

B.

Deadlines and penalties for noncompliance

C.

Results from a gap analysis

D.

An inventory of security controls currently in place

Full Access
Question # 220

Reevaluation of risk is MOST critical when there is:

A.

resistance to the implementation of mitigating controls.

B.

a management request for updated security reports.

C.

a change in security policy.

D.

a change in the threat landscape.

Full Access
Question # 221

Which of the following would BEST help to ensure appropriate security controls are built into software?

A.

Integrating security throughout the development process

B.

Performing security testing prior to deployment

C.

Providing standards for implementation during development activities

D.

Providing security training to the software development team

Full Access
Question # 222

The PRIMARY advantage of single sign-on (SSO) is that it will:

A.

increase efficiency of access management

B.

increase the security of related applications.

C.

strengthen user passwords.

D.

support multiple authentication mechanisms.

Full Access
Question # 223

Which of the following has the GREATEST influence on an organization's information security strategy?

A.

The organization's risk tolerance

B.

The organizational structure

C.

Industry security standards

D.

Information security awareness

Full Access
Question # 224

Which of the following is the BEST justification for making a revision to a password policy?

A.

Industry best practice

B.

A risk assessment

C.

Audit recommendation

D.

Vendor recommendation

Full Access
Question # 225

Which of the following is the PRIMARY objective of incident triage?

A.

Coordination of communications

B.

Mitigation of vulnerabilities

C.

Categorization of events

D.

Containment of threats

Full Access
Question # 226

The PRIMARY objective of performing a post-incident review is to:

A.

re-evaluate the impact of incidents.

B.

identify vulnerabilities.

C.

identify control improvements.

D.

identify the root cause.

Full Access
Question # 227

Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?

A.

Incorporate policy statements derived from third-party standards and benchmarks.

B.

Adhere to a unique corporate privacy and security standard

C.

Establish baseline standards for all locations and add supplemental standards as required

D.

Require that all locations comply with a generally accepted set of industry

Full Access
Question # 228

Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?

A.

Storing the plan at an offsite location

B.

Communicating the plan to all stakeholders

C.

Updating the plan periodically

D.

Conducting a walk-through of the plan

Full Access
Question # 229

Which of the following is the BEST indication of information security strategy alignment with the “&

A.

Percentage of information security incidents resolved within defined service level agreements (SLAs)

B.

Percentage of corporate budget allocated to information security initiatives

C.

Number of business executives who have attended information security awareness sessions

D.

Number of business objectives directly supported by information security initiatives

Full Access
Question # 230

An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?

A.

Install the OS, patches, and application from the original source.

B.

Restore the OS, patches, and application from a backup.

C.

Restore the application and data from a forensic copy.

D.

Remove all signs of the intrusion from the OS and application.

Full Access
Question # 231

Which of the following events would MOST likely require a revision to the information security program?

A.

An increase in industry threat level .

B.

A significant increase in reported incidents

C.

A change in IT management

D.

A merger with another organization

Full Access
Question # 232

Which of the following is the BEST approach to make strategic information security decisions?

A.

Establish regular information security status reporting.

B.

Establish an information security steering committee.

C.

Establish business unit security working groups.

D.

Establish periodic senior management meetings.

Full Access
Question # 233

Which of the following BEST enables an organization to transform its culture to support information security?

A.

Periodic compliance audits

B.

Strong management support

C.

Robust technical security controls

D.

Incentives for security incident reporting

Full Access
Question # 234

Reverse lookups can be used to prevent successful:

A.

denial of service (DoS) attacks

B.

session hacking

C.

phishing attacks

D.

Internet protocol (IP) spoofing

Full Access
Question # 235

Which of the following BEST determines the allocation of resources during a security incident response?

A.

Senior management commitment

B.

A business continuity plan (BCP)

C.

An established escalation process

D.

Defined levels of severity

Full Access
Question # 236

Which of the following would BEST justify continued investment in an information security program?

A.

Reduction in residual risk

B.

Security framework alignment

C.

Speed of implementation

D.

Industry peer benchmarking

Full Access
Question # 237

To help ensure that an information security training program is MOST effective its contents should be

A.

focused on information security policy.

B.

aligned to business processes

C.

based on employees' roles

D.

based on recent incidents

Full Access
Question # 238

Which of the following change management procedures is MOST likely to cause concern to the information security manager?

A.

Fallback processes are tested the weekend before changes are made

B.

Users are not notified of scheduled system changes

C.

A manual rather than an automated process is used to compare program versions.

D.

The development manager migrates programs into production

Full Access
Question # 239

Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?

A.

Regulatory requirements are being met.

B.

Internal compliance requirements are being met.

C.

Risk management objectives are being met.

D.

Business needs are being met.

Full Access
Question # 240

Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?

A.

Regulatory requirements

B.

Compliance acceptance

C.

Management support

D.

Budgetary approval

Full Access