New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CISM Questions and Answers

Question # 6

Which of the following is a PRIMARY benefit of managed security solutions?

A.

Wider range of capabilities

B.

Easier implementation across an organization

C.

Greater ability to focus on core business operations

D.

Lower cost of operations

Full Access
Question # 7

Which of the following is MOST important to convey to employees in building a security risk-aware culture?

A.

Personal information requires different security controls than sensitive information.

B.

Employee access should be based on the principle of least privilege.

C.

Understanding an information asset's value is critical to risk management.

D.

The responsibility for security rests with all employees.

Full Access
Question # 8

Prior to conducting a forensic examination, an information security manager should:

A.

boot the original hard disk on a clean system.

B.

create an image of the original data on new media.

C.

duplicate data from the backup media.

D.

shut down and relocate the server.

Full Access
Question # 9

Security administration efforts will be greatly reduced following the deployment of which of the following techniques?

A.

Discretionary access control

B.

Role-based access control

C.

Access control lists

D.

Distributed access control

Full Access
Question # 10

During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:

A.

baseline security controls.

B.

benchmarking security metrics.

C.

security objectives.

D.

cost-benefit analyses.

Full Access
Question # 11

Which of the following has the GREATEST influence on an organization's information security strategy?

A.

The organization's risk tolerance

B.

The organizational structure

C.

Industry security standards

D.

Information security awareness

Full Access
Question # 12

Which of the following is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?

A.

Poor documentation of results and lessons learned

B.

Lack of communication to affected users

C.

Disruption to the production environment

D.

Lack of coordination among departments

Full Access
Question # 13

Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?

A.

Lack of encryption for backup data in transit

B.

Undefined or undocumented backup retention policies

C.

Ineffective alert configurations for backup operations

D.

Unavailable or corrupt data backups

Full Access
Question # 14

Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?

A.

Maintaining a repository base of security policies

B.

Measuring impact of exploits on business processes

C.

Facilitating the monitoring of risk occurrences

D.

Redirecting event logs to an alternate location for business continuity plan

Full Access
Question # 15

Which of the following would BEST justify continued investment in an information security program?

A.

Reduction in residual risk

B.

Security framework alignment

C.

Speed of implementation

D.

Industry peer benchmarking

Full Access
Question # 16

Which of the following is the BEST course of action when an online company discovers a network attack in progress?

A.

Dump all event logs to removable media

B.

Isolate the affected network segment

C.

Enable trace logging on ail events

D.

Shut off all network access points

Full Access
Question # 17

Threat and vulnerability assessments are important PRIMARILY because they are:

A.

used to establish security investments

B.

the basis for setting control objectives.

C.

elements of the organization's security posture.

D.

needed to estimate risk.

Full Access
Question # 18

Implementing the principle of least privilege PRIMARILY requires the identification of:

A.

job duties

B.

data owners

C.

primary risk factors.

D.

authentication controls

Full Access
Question # 19

The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:

A.

the organization has the required funds to implement the plan.

B.

compliance with legal and regulatory requirements.

C.

staff participation in information security efforts.

D.

the plan aligns with corporate governance.

Full Access
Question # 20

Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?

A.

Patch management files

B.

Network system logs

C.

Configuration management files

D.

Intrusion detection system (IDS) logs

Full Access
Question # 21

Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?

A.

Ability to monitor and control incident management costs

B.

More visibility to the impact of disruptions

C.

Effective protection of information assets

D.

Optimized allocation of recovery resources

Full Access
Question # 22

Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:

A.

review access rights as the acquisition integration occurs.

B.

perform a risk assessment of the access rights.

C.

escalate concerns for conflicting access rights to management.

D.

implement consistent access control standards.

Full Access
Question # 23

Which of the following is the BEST indication of effective information security governance?

A.

Information security is considered the responsibility of the entire information security team.

B.

Information security controls are assigned to risk owners.

C.

Information security is integrated into corporate governance.

D.

Information security governance is based on an external security framework.

Full Access
Question # 24

Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?

A.

Communicate disciplinary processes for policy violations.

B.

Require staff to participate in information security awareness training.

C.

Require staff to sign confidentiality agreements.

D.

Include information security responsibilities in job descriptions.

Full Access
Question # 25

Which of the following BEST demonstrates the added value of an information security program?

A.

Security baselines

B.

A gap analysis

C.

A SWOT analysis

D.

A balanced scorecard

Full Access
Question # 26

When deciding to move to a cloud-based model, the FIRST consideration should be:

A.

storage in a shared environment.

B.

availability of the data.

C.

data classification.

D.

physical location of the data.

Full Access
Question # 27

Which of the following is the PRIMARY reason for granting a security exception?

A.

The risk is justified by the cost to the business.

B.

The risk is justified by the benefit to security.

C.

The risk is justified by the cost to security.

D.

The risk is justified by the benefit to the business.

Full Access
Question # 28

Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?

A.

Threat management is enhanced.

B.

Compliance status is improved.

C.

Security metrics are enhanced.

D.

Proactive risk management is facilitated.

Full Access
Question # 29

Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?

A.

Each process is assigned to a responsible party.

B.

The contact list is regularly updated.

C.

Minimum regulatory requirements are maintained.

D.

Senior management approval has been documented.

Full Access
Question # 30

In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:

A.

evaluate results of the most recent incident response test.

B.

review the number of reported security incidents.

C.

ensure established security metrics are reported.

D.

assess progress of risk mitigation efforts.

Full Access
Question # 31

Who is BEST suited to determine how the information in a database should be classified?

A.

Database analyst

B.

Database administrator (DBA)

C.

Information security analyst

D.

Data owner

Full Access
Question # 32

Which of the following is MOST important for building 4 robust information security culture within an organization?

A.

Mature information security awareness training across the organization

B.

Strict enforcement of employee compliance with organizational security policies

C.

Security controls embedded within the development and operation of the IT environment

D.

Senior management approval of information security policies

Full Access
Question # 33

When properly implemented, secure transmission protocols protect transactions:

A.

from eavesdropping.

B.

from denial of service (DoS) attacks.

C.

on the client desktop.

D.

in the server's database.

Full Access
Question # 34

Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?

A.

Walk-through of the incident response plan

B.

Black box penetration test

C.

Simulated phishing exercise

D.

Red team exercise

Full Access
Question # 35

The MOST appropriate time to conduct a disaster recovery test would be after:

A.

major business processes have been redesigned.

B.

the business continuity plan (BCP) has been updated.

C.

the security risk profile has been reviewed

D.

noncompliance incidents have been filed.

Full Access
Question # 36

What is the BEST way to reduce the impact of a successful ransomware attack?

A.

Perform frequent backups and store them offline.

B.

Purchase or renew cyber insurance policies.

C.

Include provisions to pay ransoms ih the information security budget.

D.

Monitor the network and provide alerts on intrusions.

Full Access
Question # 37

In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?

A.

Revise the policy.

B.

Perform a root cause analysis.

C.

Conduct a risk assessment,

D.

Communicate the acceptable use policy.

Full Access
Question # 38

The effectiveness of an information security governance framework will BEST be enhanced if:

A.

consultants review the information security governance framework.

B.

a culture of legal and regulatory compliance is promoted by management.

C.

risk management is built into operational and strategic activities.

D.

IS auditors are empowered to evaluate governance activities

Full Access
Question # 39

How does an incident response team BEST leverage the results of a business impact analysis (BIA)?

A.

Assigning restoration priority during incidents

B.

Determining total cost of ownership (TCO)

C.

Evaluating vendors critical to business recovery

D.

Calculating residual risk after the incident recovery phase

Full Access
Question # 40

An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?

A.

Definition of when a disaster should be declared

B.

Requirements for regularly testing backups

C.

Recovery time objectives (RTOs)

D.

The disaster recovery communication plan

Full Access
Question # 41

An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?

A.

Determine which country's information security regulations will be used.

B.

Merge the two existing information security programs.

C.

Apply the existing information security program to the acquired company.

D.

Evaluate the information security laws that apply to the acquired company.

Full Access
Question # 42

When investigating an information security incident, details of the incident should be shared:

A.

widely to demonstrate positive intent.

B.

only with management.

C.

only as needed,

D.

only with internal audit.

Full Access
Question # 43

Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?

A.

Security risk analysis

B.

Gap assessment

C.

Maturity assessment

D.

Vulnerability scan report

Full Access
Question # 44

Which of the following is MOST important in increasing the effectiveness of incident responders?

A.

Communicating with the management team

B.

Integrating staff with the IT department

C.

Testing response scenarios

D.

Reviewing the incident response plan annually

Full Access
Question # 45

Which of the following is the MOST important factor of a successful information security program?

A.

The program follows industry best practices.

B.

The program is based on a well-developed strategy.

C.

The program is cost-efficient and within budget,

D.

The program is focused on risk management.

Full Access
Question # 46

Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?

A.

Capability maturity model

B.

Vulnerability assessment

C.

IT security risk and exposure

D.

Business impact analysis (BIA)

Full Access
Question # 47

A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?

A.

Instruct the vendor to conduct penetration testing.

B.

Suspend the connection to the application in the firewall

C.

Report the situation to the business owner of the application.

D.

Initiate the organization's incident response process.

Full Access
Question # 48

Which of the following is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?

A.

To compare emerging trends with the existing organizational security posture

B.

To communicate worst-case scenarios to senior management

C.

To train information security professionals to mitigate new threats

D.

To determine opportunities for expanding organizational information security

Full Access
Question # 49

An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?

A.

Install the OS, patches, and application from the original source.

B.

Restore the OS, patches, and application from a backup.

C.

Restore the application and data from a forensic copy.

D.

Remove all signs of the intrusion from the OS and application.

Full Access
Question # 50

Which of the following is the PRIMARY objective of a business impact analysis (BIA)?

A.

Determine recovery priorities.

B.

Define the recovery point objective (RPO).

C.

Confirm control effectiveness.

D.

Analyze vulnerabilities.

Full Access
Question # 51

Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?

A.

Legal and regulatory requirements

B.

Likelihood of a disaster

C.

Organizational tolerance to service interruption

D.

Geographical location of the backup site

Full Access
Question # 52

To support effective risk decision making, which of the following is MOST important to have in place?

A.

Established risk domains

B.

Risk reporting procedures

C.

An audit committee consisting of mid-level management

D.

Well-defined and approved controls

Full Access
Question # 53

To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:

A.

rely on senior management to enforce security.

B.

promote the relevance and contribution of security.

C.

focus on compliance.

D.

reiterate the necessity of security.

Full Access
Question # 54

Labeling information according to its security classification:

A.

enhances the likelihood of people handling information securely.

B.

reduces the number and type of countermeasures required.

C.

reduces the need to identify baseline controls for each classification.

D.

affects the consequences if information is handled insecurely.

Full Access
Question # 55

Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?

A.

Containment

B.

Recovery

C.

Eradication

D.

Identification

Full Access
Question # 56

An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?

A.

Review independent security assessment reports for each vendor.

B.

Benchmark each vendor's services with industry best practices.

C.

Analyze the risks and propose mitigating controls.

D.

Define information security requirements and processes.

Full Access
Question # 57

Which of the following is the BEST way to ensure the capability to restore clean data after a ransomware attack?

A.

Purchase cyber insurance

B.

Encrypt sensitive production data

C.

Perform Integrity checks on backups

D.

Maintain multiple offline backups

Full Access
Question # 58

Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?

A.

Requiring challenge/response information

B.

Requiring multi factor authentication

C.

Enforcing frequent password changes

D.

Enforcing complex password formats

Full Access
Question # 59

Which of the following will ensure confidentiality of content when accessing an email system over the Internet?

A.

Multi-factor authentication

B.

Digital encryption

C.

Data masking

D.

Digital signatures

Full Access
Question # 60

What is the PRIMARY objective of performing a vulnerability assessment following a business system update?

A.

Determine operational losses.

B.

Improve the change control process.

C.

Update the threat landscape.

D.

Review the effectiveness of controls

Full Access
Question # 61

Which of the following is the MOST effective way to prevent information security incidents?

A.

Implementing a security information and event management (SIEM) tool

B.

Implementing a security awareness training program for employees

C.

Deploying a consistent incident response approach

D.

Deploying intrusion detection tools in the network environment

Full Access
Question # 62

Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?

A.

Performing penetration tests against the network to demonstrate business vulnerability

B.

Highlighting competitor performance regarding network best security practices

C.

Demonstrating that targeted security controls tie to business objectives

D.

Presenting comparable security implementation estimates from several vendors

Full Access
Question # 63

A balanced scorecard MOST effectively enables information security:

A.

project management

B.

governance.

C.

performance.

D.

risk management.

Full Access
Question # 64

When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?

A.

The information security strategy

B.

Losses due to security incidents

C.

The results of a risk assessment

D.

Security investment trends in the industry

Full Access
Question # 65

Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?

A.

Monitor the effectiveness of controls

B.

Update the risk assessment framework

C.

Review the inherent risk level

D.

Review the risk probability and impact

Full Access
Question # 66

A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?

A.

Prevent the user from using personal mobile devices.

B.

Report the incident to the police.

C.

Wipe the device remotely.

D.

Remove user's access to corporate data.

Full Access
Question # 67

Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?

A.

Impact on information security program

B.

Cost of controls

C.

Impact to business function

D.

Cost to replace

Full Access
Question # 68

Which of the following documents should contain the INITIAL prioritization of recovery of services?

A.

IT risk analysis

B.

Threat assessment

C.

Business impact analysis (BIA)

D.

Business process map

Full Access
Question # 69

Of the following, whose input is of GREATEST importance in the development of an information security strategy?

A.

Process owners

B.

End users

C.

Security architects.

D.

Corporate auditors

Full Access
Question # 70

Which of the following is the BEST way to obtain support for a new organization-wide information security program?

A.

Benchmark against similar industry organizations

B.

Deliver an information security awareness campaign.

C.

Publish an information security RACI chart.

D.

Establish an information security strategy committee.

Full Access
Question # 71

Which of the following is the BEST justification for making a revision to a password policy?

A.

Industry best practice

B.

A risk assessment

C.

Audit recommendation

D.

Vendor recommendation

Full Access
Question # 72

Which of the following analyses will BEST identify the external influences to an organization's information security?

A.

Business impact analysis (BIA)

B.

Gap analysis

C.

Threat analysis

D.

Vulnerability analysis

Full Access
Question # 73

When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?

A.

Business process owner

B.

Business continuity coordinator

C.

Senior management

D.

Information security manager

Full Access
Question # 74

Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?

A.

Adopt the cloud provider's incident response procedures.

B.

Transfer responsibility for incident response to the cloud provider.

C.

Continue using the existing incident response procedures.

D.

Revise incident response procedures to encompass the cloud environment.

Full Access
Question # 75

Which of the following defines the triggers within a business continuity plan (BCP)? @

A.

Needs of the organization

B.

Disaster recovery plan (DRP)

C.

Information security policy

D.

Gap analysis

Full Access
Question # 76

An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?

A.

Establishing the authority to remote wipe

B.

Developing security awareness training

C.

Requiring the backup of the organization's data by the user

D.

Monitoring how often the smartphone is used

Full Access
Question # 77

Which of the following BEST determines the allocation of resources during a security incident response?

A.

Senior management commitment

B.

A business continuity plan (BCP)

C.

An established escalation process

D.

Defined levels of severity

Full Access
Question # 78

Which of the following would BEST help to ensure appropriate security controls are built into software?

A.

Integrating security throughout the development process

B.

Performing security testing prior to deployment

C.

Providing standards for implementation during development activities

D.

Providing security training to the software development team

Full Access
Question # 79

Which of the following is the GREATEST benefit of information asset classification?

A.

Helping to determine the recovery point objective (RPO)

B.

Providing a basis for implementing a need-to-know policy

C.

Supporting segregation of duties

D.

Defining resource ownership

Full Access
Question # 80

A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:

A.

developing a security program that meets global and regional requirements.

B.

ensuring effective communication with local regulatory bodies.

C.

using industry best practice to meet local legal regulatory requirements.

D.

monitoring compliance with defined security policies and standards.

Full Access
Question # 81

Which of the following BEST enables an organization to transform its culture to support information security?

A.

Periodic compliance audits

B.

Strong management support

C.

Robust technical security controls

D.

Incentives for security incident reporting

Full Access
Question # 82

The PRIMARY objective of performing a post-incident review is to:

A.

re-evaluate the impact of incidents.

B.

identify vulnerabilities.

C.

identify control improvements.

D.

identify the root cause.

Full Access
Question # 83

A newly appointed information security manager of a retailer with multiple stores discovers an HVAC (heating, ventilation, and air conditioning) vendor has remote access to the stores to enable real-time monitoring and equipment diagnostics. Which of the following should be the information security manager's FIRST course of action?

A.

Conduct a penetration test of the vendor.

B.

Review the vendor's technical security controls

C.

Review the vendor contract

D.

Disconnect the real-time access

Full Access
Question # 84

Which of the following is the BEST indication of information security strategy alignment with the “&

A.

Percentage of information security incidents resolved within defined service level agreements (SLAs)

B.

Percentage of corporate budget allocated to information security initiatives

C.

Number of business executives who have attended information security awareness sessions

D.

Number of business objectives directly supported by information security initiatives

Full Access
Question # 85

Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?

A.

Require remote wipe capabilities for devices.

B.

Conduct security awareness training.

C.

Review and update existing security policies.

D.

Enforce passwords and data encryption on the devices.

Full Access
Question # 86

An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?

A.

Store disaster recovery documentation in a public cloud.

B.

Maintain an outsourced contact center in another country.

C.

Require disaster recovery documentation be stored with all key decision makers.

D.

Provide annual disaster recovery training to appropriate staff.

Full Access
Question # 87

Which of the following backup methods requires the MOST time to restore data for an application?

A.

Full backup

B.

Incremental

C.

Differential

D.

Disk mirroring

Full Access
Question # 88

Which of the following is the responsibility of a risk owner?

A.

Implementing risk treatment plan activities with control owners

B.

Evaluating control effectiveness

C.

Approving risk treatment plans

D.

Approving the selection of risk mitigation measures

Full Access
Question # 89

The PRIMARY objective of a post-incident review of an information security incident is to:

A.

update the risk profile

B.

minimize impact

C.

prevent recurrence.

D.

determine the impact

Full Access
Question # 90

Which of the following should be the PRIMARY objective of an information security governance framework?

A.

Provide a baseline for optimizing the security profile of the organization.

B.

Demonstrate senior management commitment.

C.

Demonstrate compliance with industry best practices to external stakeholders.

D.

Ensure that users comply with the organization's information security policies.

Full Access
Question # 91

Which of the following is the MOST critical factor for information security program success?

A.

comprehensive risk assessment program for information security

B.

The information security manager's knowledge of the business

C.

Security staff with appropriate training and adequate resources

D.

Ongoing audits and addressing open items

Full Access
Question # 92

Which of the following change management procedures is MOST likely to cause concern to the information security manager?

A.

Fallback processes are tested the weekend before changes are made

B.

Users are not notified of scheduled system changes

C.

A manual rather than an automated process is used to compare program versions.

D.

The development manager migrates programs into production

Full Access
Question # 93

Which risk is introduced when using only sanitized data for the testing of applications?

A.

Data loss may occur during the testing phase.

B.

Data disclosure may occur during the migration event

C.

Unexpected outcomes may arise in production

D.

Breaches of compliance obligations will occur.

Full Access
Question # 94

An organization's HR department requires that employee account privileges be removed from all corporate IT systems within three days of termination to comply with a government regulation However, the systems all have different user directories, and it currently takes up to four weeks to remove the privileges Which of the following would BEST enable regulatory compliance?

A.

Multi-factor authentication (MFA) system

B.

Identity and access management (IAM) system

C.

Privileged access management (PAM) system

D.

Governance, risk, and compliance (GRC) system

Full Access
Question # 95

Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?

A.

Clearer segregation of duties

B.

Increased user productivity

C.

Increased accountability

D.

Fewer security incidents

Full Access
Question # 96

A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is

A.

the risk assessment has not defined the likelihood of occurrence

B.

the reported vulnerability has not been validated

C.

executive management is not aware of the impact potential

D.

the cost of implementing controls exceeds the potential financial losses.

Full Access
Question # 97

Which of the following is the PRIMARY objective of incident triage?

A.

Coordination of communications

B.

Mitigation of vulnerabilities

C.

Categorization of events

D.

Containment of threats

Full Access
Question # 98

The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:

A.

results of exit interviews.

B.

previous training sessions.

C.

examples of help desk requests.

D.

responses to security questionnaires.

Full Access
Question # 99

Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?

A.

Incorporate policy statements derived from third-party standards and benchmarks.

B.

Adhere to a unique corporate privacy and security standard

C.

Establish baseline standards for all locations and add supplemental standards as required

D.

Require that all locations comply with a generally accepted set of industry

Full Access
Question # 100

Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?

A.

Providing training from third-party forensics firms

B.

Obtaining industry certifications for the response team

C.

Conducting tabletop exercises appropriate for the organization

D.

Documenting multiple scenarios for the organization and response steps

Full Access
Question # 101

The PRIMARY objective of performing a post-incident review is to:

A.

re-evaluate the impact of incidents

B.

identify vulnerabilities

C.

identify control improvements.

D.

identify the root cause.

Full Access
Question # 102

The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?

A.

Inform senior management

B.

Re-evaluate the risk

C.

Implement compensating controls

D.

Ask the business owner for the new remediation plan

Full Access
Question # 103

Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?

A.

Decrease in the number of security incidents

B.

Increase in the frequency of security incident escalations

C.

Reduction in the impact of security incidents

D.

Increase in the number of reported security incidents

Full Access
Question # 104

An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?

A.

Initiate incident response.

B.

Disable remote

C.

Initiate a device reset.

D.

Conduct a risk assessment.

Full Access
Question # 105

A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?

A.

Ensure a risk assessment is performed to evaluate the findings

B.

Ensure vulnerabilities found are resolved within acceptable timeframes

C.

Request funding needed to resolve the top vulnerabilities

D.

Report findings to senior management

Full Access
Question # 106

Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?

A.

Metrics to drive the information security program

B.

Information security policies

C.

A defined security organizational structure

D.

An information security strategy

Full Access
Question # 107

Which of the following should be the PRIMARY area of focus when mitigating security risks associated with emerging technologies?

A.

Compatibility with legacy systems

B.

Application of corporate hardening standards

C.

Integration with existing access controls

D.

Unknown vulnerabilities

Full Access
Question # 108

Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?

A.

Documentation of control procedures

B.

Standardization of compliance requirements

C.

Automation of controls

D.

Integration of assurance efforts

Full Access
Question # 109

Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?

A.

Compromise of critical assets via third-party resources

B.

Unavailability of services provided by a supplier

C.

Loss of customers due to unavailability of products

D.

Unreliable delivery of hardware and software resources by a supplier

Full Access
Question # 110

Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?

A.

Internal security audit

B.

External security audit

C.

Organizational risk appetite

D.

Business impact analysis (BIA)

Full Access
Question # 111

An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?

A.

Identification of risk

B.

Analysis of control gaps

C.

Design of key risk indicators (KRIs)

D.

Selection of risk treatment options

Full Access
Question # 112

Which of the following processes BEST supports the evaluation of incident response effectiveness?

A.

Root cause analysis

B.

Post-incident review

C.

Chain of custody

D.

Incident logging

Full Access
Question # 113

Which of the following is PRIMARILY determined by asset classification?

A.

Insurance coverage required for assets

B.

Level of protection required for assets

C.

Priority for asset replacement

D.

Replacement cost of assets

Full Access
Question # 114

An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?

A.

Implement the application and request the cloud service provider to fix the vulnerability.

B.

Assess whether the vulnerability is within the organization's risk tolerance levels.

C.

Commission further penetration tests to validate initial test results,

D.

Postpone the implementation until the vulnerability has been fixed.

Full Access
Question # 115

When developing an asset classification program, which of the following steps should be completed FIRST?

A.

Categorize each asset.

B.

Create an inventory. &

C.

Create a business case for a digital rights management tool.

D.

Implement a data loss prevention (OLP) system.

Full Access
Question # 116

Which of the following messages would be MOST effective in obtaining senior management's commitment to information security management?

A.

Effective security eliminates risk to the business.

B.

Adopt a recognized framework with metrics.

C.

Security is a business product and not a process.

D.

Security supports and protects the business.

Full Access
Question # 117

Which of the following BEST supports the incident management process for attacks on an organization's supply chain?

A.

Including service level agreements (SLAs) in vendor contracts

B.

Establishing communication paths with vendors

C.

Requiring security awareness training for vendor staff

D.

Performing integration testing with vendor systems

Full Access
Question # 118

Which of the following should be the PRIMARY consideration when developing an incident response plan?

A.

The definition of an incident

B.

Compliance with regulations

C.

Management support

D.

Previously reported incidents

Full Access
Question # 119

An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?

A.

Responsible entities

B.

Key risk indicators (KRIS)

C.

Compensating controls

D.

Potential business impact

Full Access
Question # 120

Which of the following is the PRIMARY role of an information security manager in a software development project?

A.

To enhance awareness for secure software design

B.

To assess and approve the security application architecture

C.

To identify noncompliance in the early design stage

D.

To identify software security weaknesses

Full Access
Question # 121

When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?

A.

Data is encrypted in transit and at rest at the vendor site.

B.

Data is subject to regular access log review.

C.

The vendor must be able to amend data.

D.

The vendor must agree to the organization's information security policy,

Full Access
Question # 122

Which of the following BEST indicates that information assets are classified accurately?

A.

Appropriate prioritization of information risk treatment

B.

Increased compliance with information security policy

C.

Appropriate assignment of information asset owners

D.

An accurate and complete information asset catalog

Full Access
Question # 123

Which of the following is the BEST indication ofa successful information security culture?

A.

Penetration testing is done regularly and findings remediated.

B.

End users know how to identify and report incidents.

C.

Individuals are given roles based on job functions.

D.

The budget allocated for information security is sufficient.

Full Access
Question # 124

Which of the following parties should be responsible for determining access levels to an application that processes client information?

A.

The business client

B.

The information security tear

C.

The identity and access management team

D.

Business unit management

Full Access
Question # 125

Which of the following is the BEST approach for governing noncompliance with security requirements?

A.

Base mandatory review and exception approvals on residual risk,

B.

Require users to acknowledge the acceptable use policy.

C.

Require the steering committee to review exception requests.

D.

Base mandatory review and exception approvals on inherent risk.

Full Access
Question # 126

Which of the following will have the GREATEST influence on the successful adoption of an information security governance program?

A.

Security policies

B.

Control effectiveness

C.

Security management processes

D.

Organizational culture

Full Access
Question # 127

Which of the following will BEST facilitate the integration of information security governance into enterprise governance?

A.

Developing an information security policy based on risk assessments

B.

Establishing an information security steering committee

C.

Documenting the information security governance framework

D.

Implementing an information security awareness program

Full Access
Question # 128

An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?

A.

Conduct an impact assessment.

B.

Isolate the affected systems.

C.

Rebuild the affected systems.

D.

Initiate incident response.

Full Access
Question # 129

Which of the following BEST facilitates effective incident response testing?

A.

Including all business units in testing

B.

Simulating realistic test scenarios

C.

Reviewing test results quarterly

D.

Testing after major business changes

Full Access
Question # 130

Which of the following BEST supports information security management in the event of organizational changes in security personnel?

A.

Formalizing a security strategy and program

B.

Developing an awareness program for staff

C.

Ensuring current documentation of security processes

D.

Establishing processes within the security operations team

Full Access
Question # 131

Which of the following is MOST critical when creating an incident response plan?

A.

Identifying vulnerable data assets

B.

Identifying what constitutes an incident

C.

Documenting incident notification and escalation processes

D.

Aligning with the risk assessment process

Full Access
Question # 132

Which of the following provides the BEST assurance that security policies are applied across business operations?

A.

Organizational standards are included in awareness training.

B.

Organizational standards are enforced by technical controls.

C.

Organizational standards are required to be formally accepted.

D.

Organizational standards are documented in operational procedures.

Full Access
Question # 133

During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?

A.

Post-incident review

B.

Eradication

C.

Containment

D.

Identification

Full Access
Question # 134

A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:

A.

incident has been confirmed.

B.

incident has been contained.

C.

potential incident has been logged.

D.

incident has been mitigated.

Full Access
Question # 135

An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:

A.

conduct an incident forensic analysis.

B.

fallow the incident response plan

C.

notify the business process owner.

D.

fallow the business continuity plan (BCP).

Full Access
Question # 136

ACISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider's data center. Which of the following should the CISO do FIRST?

A.

Recommend canceling the outsourcing contract.

B.

Request an independent review of the provider's data center.

C.

Notify affected customers of the data breach.

D.

Determine the extent of the impact to the organization.

Full Access
Question # 137

Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?

A.

Security policy

B.

Risk management framework

C.

Risk appetite

D.

Security standards

Full Access
Question # 138

An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?

A.

Determine whether the organization can benefit from adopting the new standard.

B.

Obtain legal counsel's opinion on the standard's applicability to regulations,

C.

Perform a risk assessment on the new technology.

D.

Review industry specialists’ analyses of the new standard.

Full Access
Question # 139

An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?

A.

Create a business case for a new incident response plan.

B.

Revise the existing incident response plan.

C.

Conduct a gap analysis.

D.

Assess the impact to the budget,

Full Access
Question # 140

The MAIN benefit of implementing a data loss prevention (DLP) solution is to:

A.

enhance the organization's antivirus controls.

B.

eliminate the risk of data loss.

C.

complement the organization's detective controls.

D.

reduce the need for a security awareness program.

Full Access
Question # 141

Which is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?

A.

Parallel test

B.

Full interruption test

C.

Simulation test

D.

Tabletop test

Full Access
Question # 142

An information security manager developing an incident response plan MUST ensure it includes:

A.

an inventory of critical data.

B.

criteria for escalation.

C.

a business impact analysis (BIA).

D.

critical infrastructure diagrams.

Full Access
Question # 143

Information security controls should be designed PRIMARILY based on:

A.

a business impact analysis (BIA).

B.

regulatory requirements.

C.

business risk scenarios,

D.

a vulnerability assessment.

Full Access
Question # 144

Which of the following activities MUST be performed by an information security manager for change requests?

A.

Perform penetration testing on affected systems.

B.

Scan IT systems for operating system vulnerabilities.

C.

Review change in business requirements for information security.

D.

Assess impact on information security risk.

Full Access
Question # 145

If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:

A.

contact law enforcement.

B.

document the chain of custody.

C.

capture evidence using standard server-backup utilities.

D.

reboot affected machines in a secure area to search for evidence.

Full Access
Question # 146

Which of the following is the BEST course of action for an information security manager to align security and business goals?

A.

Conducting a business impact analysis (BIA)

B.

Reviewing the business strategy

C.

Defining key performance indicators (KPIs)

D.

Actively engaging with stakeholders

Full Access
Question # 147

Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?

A.

The capabilities and expertise of the information security team

B.

The organization's mission statement and roadmap

C.

A prior successful information security strategy

D.

The organization's information technology (IT) strategy

Full Access
Question # 148

In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:

A.

change activities are documented.

B.

the rationale for acceptance is periodically reviewed.

C.

the acceptance is aligned with business strategy.

D.

compliance with the risk acceptance framework.

Full Access
Question # 149

An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?

A.

Instruct IT to deploy controls based on urgent business needs.

B.

Present a business case for additional controls to senior management.

C.

Solicit bids for compensating control products.

D.

Recommend a different application.

Full Access
Question # 150

Which of the following is MOST important to consider when determining asset valuation?

A.

Asset recovery cost

B.

Asset classification level

C.

Cost of insurance premiums

D.

Potential business loss

Full Access
Question # 151

Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?

A.

Focus on addressing conflicts between security and performance.

B.

Collaborate with business and IT functions in determining controls.

C.

Include information security requirements in the change control process.

D.

Obtain assistance from IT to implement automated security cantrals.

Full Access
Question # 152

Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?

A.

Threat management is enhanced.

B.

Compliance status is improved.

C.

Security metrics are enhanced.

D.

Proactive risk management is facilitated.

Full Access
Question # 153

When choosing the best controls to mitigate risk to acceptable levels, the information security manager's decision should be MAINLY driven by:

A.

best practices.

B.

control framework

C.

regulatory requirements.

D.

cost-benefit analysis,

Full Access
Question # 154

Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?

A.

Review the previous risk assessment and countermeasures.

B.

Perform a new risk assessment,

C.

Evaluate countermeasures to mitigate new risks.

D.

Transfer the new risk to a third party.

Full Access
Question # 155

An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:

A.

the chief risk officer (CRO).

B.

business senior management.

C.

the information security manager.

D.

the compliance officer.

Full Access
Question # 156

Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?

A.

Cost of the attack to the organization

B.

Location of the attacker

C.

Method of operation used by the attacker

D.

Details from intrusion detection system (IDS) logs

Full Access
Question # 157

Which of the following BEST ensures timely and reliable access to services?

A.

Nonrepudiation

B.

Authenticity

C.

Availability

D.

Recovery time objective (RTO)

Full Access
Question # 158

Which of the following will result in the MOST accurate controls assessment?

A.

Mature change management processes

B.

Senior management support

C.

Well-defined security policies

D.

Unannounced testing

Full Access
Question # 159

Which of the following is the MOST effective way to ensure the security of services and solutions delivered by third-party vendors?

A.

Integrate risk management into the vendor management process.

B.

Conduct security reviews on the services and solutions delivered.

C.

Review third-party contracts as part of the vendor management process.

D.

Perform an audit on vendors' security controls and practices.

Full Access
Question # 160

Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?

A.

Assess changes in the risk profile.

B.

Activate the disaster recovery plan (DRP).

C.

Invoke the incident response plan.

D.

Conduct security awareness training.

Full Access
Question # 161

Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?

A.

Impact of service interruption

B.

Results of recovery testing

C.

Determination of recovery point objective (RPO)

D.

Direction from senior management

Full Access
Question # 162

Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?

A.

Protection of business value and assets

B.

Identification of core business strategies

C, Easier entrance into new businesses and technologies

C.

Improved regulatory compliance posture

Full Access
Question # 163

Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.

Which of the following should be the PRIMARY focus of Company A's information security manager?

A.

Company B's security policies

B.

The cost to align to Company A's security policies

C.

Company A's security architecture

D.

The organizational structure of Company B

Full Access
Question # 164

Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?

A.

Information security program metrics

B.

Results of a recent external audit

C.

The information security operations matrix

D.

Changes to information security risks

Full Access
Question # 165

Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?

A.

Perform a vulnerability assessment

B.

Perform a gap analysis to determine needed resources

C.

Create a security exception

D.

Assess the risk to business operations

Full Access
Question # 166

Which of the following should include contact information for representatives of equipment and software vendors?

A.

Information security program charter

B.

Business impact analysis (BIA)

C.

Service level agreements (SLAs)

D.

Business continuity plan (BCP)

Full Access
Question # 167

Which of the following is the MOST important reason to document information security incidents that are reported across the organization?

A.

Evaluate the security posture of the organization.

B.

Identify unmitigated risk.

C.

Prevent incident recurrence.

D.

Support business investments in security.

Full Access
Question # 168

An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?

A.

Feedback from the vendor's previous clients

B.

Alignment of the vendor's business objectives with enterprise security goals

C.

The maturity of the vendor's internal control environment

D.

Penetration testing against the vendor's network

Full Access
Question # 169

Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?

A.

Conduct a business impact analysis (BIA)

B.

Identify the response and recovery learns.

C.

Review the communications plan.

D.

Develop response and recovery strategies.

Full Access
Question # 170

Which of the following should be the FIRST step in developing an information security strategy?

A.

Perform a gap analysis based on the current state

B.

Create a roadmap to identify security baselines and controls.

C.

Identify key stakeholders to champion information security.

D.

Determine acceptable levels of information security risk.

Full Access
Question # 171

Recommendations for enterprise investment in security technology should be PRIMARILY based on:

A.

adherence to international standards

B.

availability of financial resources

C.

the organization s risk tolerance

D.

alignment with business needs

Full Access
Question # 172

A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?

A.

Update in accordance with the best business practices.

B.

Perform a risk assessment of the current IT environment.

C.

Gain an understanding of the current business direction.

D.

Inventory and review current security policies.

Full Access
Question # 173

When determining an acceptable risk level which of the following is the MOST important consideration?

A.

Threat profiles

B.

System criticalities

C.

Vulnerability scores

D.

Risk matrices

Full Access
Question # 174

Which of the following is MOST important to include in an information security policy?

A.

Best practices

B.

Management objectives

C.

Baselines

D.

Maturity levels

Full Access
Question # 175

An information security team has confirmed that threat actors are taking advantage of a newly announced critical vulnerability within an application. Which of the following should be done

FIRST?

A.

Install additional application controls.

B.

Notify senior management.

C.

Invoke the incident response plan.

D.

Prevent access to the application.

Full Access
Question # 176

An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:

A.

disable the user's access to corporate resources.

B.

terminate the device connectivity.

C.

remotely wipe the device

D.

escalate to the user's management

Full Access
Question # 177

The PRIMARY reason for creating a business case when proposing an information security project is to:

A.

articulate inherent risks.

B.

provide demonstrated return on investment (ROI).

C.

establish the value of the project in relation to business objectives.

D.

gain key business stakeholder engagement.

Full Access
Question # 178

Which of the following is the BEST way to obtain organization-wide support for an information security program?

A.

Mandate regular security awareness training.

B.

Develop security performance metrics.

C.

Position security as a business enabler.

D.

Prioritize security initiatives based on IT strategy.

Full Access
Question # 179

Which of the following should be done FIRST when establishing an information security governance framework?

A.

Evaluate information security tools and skills relevant for the environment.

B.

Gain an understanding of the business and cultural attributes.

C.

Contract a third party to conduct an independent review of the program.

D.

Conduct a cost-benefit analysis of the framework.

Full Access
Question # 180

A technical vulnerability assessment on a personnel information management server should be performed when:

A.

the data owner leaves the organization unexpectedly.

B.

changes are made to the system configuration.

C.

the number of unauthorized access attempts increases.

D.

an unexpected server outage has occurred.

Full Access
Question # 181

Which of the following would MOST effectively ensure that a new server is appropriately secured?

A.

Performing secure code reviews

B.

Enforcing technical security standards

C.

Conducting penetration testing

D.

Initiating security scanning

Full Access
Question # 182

An organization's automated security monitoring tool generates an excessively large amount of falsq positives. Which of the following is the BEST method to optimize the monitoring process?

A.

Report only critical alerts.

B.

Change reporting thresholds.

C.

Reconfigure log recording.

D.

Monitor incidents in a specific time frame.

Full Access
Question # 183

Which of the following is the BEST way lo monitor for advanced persistent threats (APT) in an organization?

A.

Network with peers in the industry to share information.

B.

Browse the Internet to team of potential events

C.

Search for anomalies in the environment

D.

Search for threat signatures in the environment.

Full Access
Question # 184

Which of the following is the MOST effective way to identify changes in an information security environment?

A.

Business impact analysis (BIA)

B.

Annual risk assessments

C.

Regular penetration testing

D.

Continuous monitoring

Full Access
Question # 185

An information security manager has been tasked with developing materials to update the board, regulatory agencies, and the media about a security incident. Which of the following should the information security manager do FIRST?

A.

Set up communication channels for the target audience.

B.

Determine the needs and requirements of each audience.

C.

Create a comprehensive singular communication

D.

Invoke the organization's incident response plan.

Full Access
Question # 186

Which of the following provides the BEST evidence that a recently established infofmation security program is effective?

A.

The number of reported incidents has increased

B.

Regular IT balanced scorecards are communicated.

C.

Senior management has reported fewer junk emails.

D.

The number of tickets associated with IT incidents have stayed consistent

Full Access
Question # 187

Which of the following should be done FIRST when a SIEM flags a potential event?

A.

Validate the event is not a false positive.

B.

Initiate the incident response plan.

C.

Escalate the event to the business owner.

D.

Implement compensating controls.

Full Access
Question # 188

An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?

A.

Lack of availability

B.

Lack of accountability

C.

Improper authorization

D.

Inadequate authentication

Full Access
Question # 189

Which of the following would be of GREATEST assistance in determining whether to accept residual risk of a critical security system?

A.

Available annual budget

B.

Cost-benefit analysis of mitigating controls

C.

Recovery time objective (RTO)

D.

Maximum tolerable outage (MTO)

Full Access
Question # 190

In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?

A.

Ownership of security

B.

Compliance with policies

C.

Auditability of systems

D.

Allocation of training resources

Full Access
Question # 191

The PRIMARY goal to a post-incident review should be to:

A.

identify policy changes to prevent a recurrence.

B.

determine how to improve the incident handling process.

C.

establish the cost of the incident to the business.

D.

determine why the incident occurred.

Full Access
Question # 192

Which of the following is MOST important to have in place for an organization's information security program to be effective?

A.

Documented information security processes

B.

A comprehensive IT strategy

C.

Senior management support

D.

Defined and allocated budget

Full Access
Question # 193

The PRIMARY consideration when responding to a ransomware attack should be to ensure:

A.

backups are available.

B.

the most recent patches have been applied.

C.

the ransomware attack is contained

D.

the business can operate

Full Access
Question # 194

Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?

A.

Inform the public relations officer.

B.

Monitor the third party's response.

C.

Invoke the incident response plan.

D.

Inform customers of the breach.

Full Access
Question # 195

A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?

A.

Authority of the subscriber to approve access to its data

B.

Right of the subscriber to conduct onsite audits of the vendor

C.

Commingling of subscribers' data on the same physical server

D.

Escrow of software code with conditions for code release

Full Access
Question # 196

When analyzing the emerging risk and threat landscape, an information security manager should FIRST:

A.

determine the impact if threats materialize.

B.

determine the sources of emerging threats.

C.

review historical threats within the industry.

D.

map threats to business assets.

Full Access
Question # 197

Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?

A.

Compartmentalization

B.

Overlapping redundancy

C.

Continuous monitoring

D.

Multi-factor authentication

Full Access
Question # 198

Which of the following is MOST important to the effectiveness of an information security program?

A.

Security metrics

B.

Organizational culture

C.

IT governance

D.

Risk management

Full Access
Question # 199

Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?

A.

To enforce security policy requirements

B.

To maintain business asset inventories

C.

To ensure audit and compliance requirements are met

D.

To ensure the availability of business operations

Full Access
Question # 200

A security incident has been reported within an organization. When should an information security manager contact the information owner?

A.

After the incident has been contained

B.

After the incident has been mitigated

C.

After the incident has been confirmed

D.

After the potential incident has been logged

Full Access
Question # 201

Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?

A.

Requiring an external security audit of the IT service provider

B.

Requiring regular reporting from the IT service provider

C.

Defining information security requirements with internal IT

D.

Defining the business recovery plan with the IT service provider

Full Access
Question # 202

Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P

A.

Report the decision to the compliance officer

B.

Update details within the risk register.

C.

Reassess the organization's risk tolerance.

D.

Assess the impact of the regulation.

Full Access
Question # 203

What type of control is being implemented when a security information and event management (SIEM) system is installed?

A.

Preventive

B.

Deterrent

C.

Detective

D.

Corrective

Full Access
Question # 204

After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?

A.

The service level agreement (SLA) was not met.

B.

The recovery time objective (RTO) was not met.

C.

The root cause was not identified.

D.

Notification to stakeholders was delayed.

Full Access
Question # 205

An organization that conducts business globally is planning to utilize a third-party service provider to process payroll information. Which of the following issues poses the GREATEST risk to the organization?

A.

The third party does not have an independent assessment of controls available for review.

B.

The third party has not provided evidence of compliance with local regulations where data is generated.

C.

The third-party contract does not include an indemnity clause for compensation in the event of a breach.

D.

The third party's service level agreement (SLA) does not include guarantees of uptime.

Full Access
Question # 206

An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?

A.

Implementing automated vulnerability scanning in the help desk workflow

B.

Changing the default setting for all security incidents to the highest priority

C.

Integrating automated service level agreement (SLA) reporting into the help desk ticketing system

D.

Integrating incident response workflow into the help desk ticketing system

Full Access
Question # 207

Which of the following BEST enables an incident response team to determine appropriate actions during an initial investigation?

A.

Feedback from affected departments

B.

Historical data from past incidents

C.

Technical capabilities of the team

D.

Procedures for incident triage

Full Access
Question # 208

Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?

A.

Report the risk associated with the policy breach.

B.

Enforce the security configuration and require the change to be reverted.

C.

Implement compensating controls to address the risk.

D.

Implement a privileged access management system.

Full Access
Question # 209

Who has the PRIMARY authority to decide if additional risk treatments are required to mitigate an identified risk?

A.

Information security manager

B.

IT risk manager

C.

Internal auditor

D.

Risk owner

Full Access
Question # 210

Which of the following is the PRIMARY purpose of an acceptable use policy?

A.

To provide steps for carrying out security-related procedures

B.

To facilitate enforcement of security process workflows

C.

To protect the organization from misuse of information assets

D.

To provide minimum security baselines for information assets

Full Access
Question # 211

In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?

A.

Access to the hardware

B.

Data encryption

C.

Non-standard event logs

D.

Compressed customer data

Full Access
Question # 212

During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?

A.

The certification includes industry-recognized security controls.

B.

The certification was issued within the last five years.

C.

The certification is issued for the specific scope.

D.

The certification is easily verified.

Full Access
Question # 213

Which of the following should be the GREATEST concern for an information security manager when an annual audit reveals the organization's business continuity plan (BCP) has not been reviewed or updated in more than a year?

A.

An outdated BCP may result in less efficient recovery if an actual incident occurs.

B.

The organization may suffer reputational damage for not following industry best practices.

C.

The audit finding may impact the overall risk rating of the organization.

D.

The lack of updates to the BCP may result in noncompliance with internal policies.

Full Access
Question # 214

Which of the following processes is MOST important for the success of a business continuity plan (BCP)?

A.

Involving all stakeholders in testing and training

B.

Scheduling periodic internal and external audits

C.

Including the board and senior management in plan reviews

D.

Maintaining copies of the plan at the primary and recovery sites

Full Access
Question # 215

Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?

A.

Develop a personal device policy

B.

Implement a mobile device management (MDM) solution

C.

Develop training specific to BYOD awareness

D.

Define control requirements

Full Access
Question # 216

A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:

A.

require that the change be reversed

B.

review the change management process

C.

perform an analysis of the change

D.

report the event to senior management

Full Access
Question # 217

The contribution of recovery point objective (RPO) to disaster recovery is to:

A.

minimize outage periods.

B.

eliminate single points of failure.

C.

define backup strategy

D.

reduce mean time between failures (MTBF).

Full Access
Question # 218

Which of the following is the MOST important reason for logging firewall activity?

A.

Metrics reporting

B.

Firewall tuning

C.

Intrusion prevention

D.

Incident investigation

Full Access
Question # 219

Which of the following BEST facilitates the effective execution of an incident response plan?

A.

The plan is based on risk assessment results.

B.

The response team is trained on the plan

C.

The plan is based on industry best practice.

D.

The incident response plan aligns with the IT disaster recovery plan (DRP).

Full Access
Question # 220

When developing a categorization method for security incidents, the categories MUST:

A.

align with industry standards.

B.

be created by the incident handler.

C.

have agreed-upon definitions.

D.

align with reporting requirements.

Full Access
Question # 221

An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?

A.

Control owner responses based on a root cause analysis

B.

The impact of noncompliance on the organization's risk profile

C.

A noncompliance report to initiate remediation activities

D.

A business case for transferring the risk

Full Access
Question # 222

Which of the following should be triggered FIRST when unknown malware has infected an organization's critical system?

A.

Incident response plan

B.

Disaster recovery plan (DRP)

C.

Business continuity plan (BCP)

D.

Vulnerability management plan

Full Access
Question # 223

Once a suite of security controls has been successfully implemented for an organization's business units, it is MOST important for the information security manager to:

A.

hand over the controls to the relevant business owners.

B.

ensure the controls are regularly tested for ongoing effectiveness.

C.

perform testing to compare control performance against industry levels.

D.

prepare to adapt the controls for future system upgrades.

Full Access
Question # 224

Which of the following is MOST important to include in an information security status report to senior management?

A.

Key risk indicators (KRIs)

B.

Review of information security policies

C.

Information security budget requests

D.

List of recent security events

Full Access
Question # 225

Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?

A.

IT strategy

B.

Recovery strategy

C.

Risk mitigation strategy

D.

Security strategy

Full Access
Question # 226

An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''

A.

Deploy mobile device management (MDM)

B.

Implement remote wipe capability.

C.

Create an acceptable use policy.

D.

Conduct a mobile device risk assessment

Full Access
Question # 227

Which of the following is MOST appropriate to communicate to senior management regarding information risk?

A.

Emerging security technologies

B.

Risk profile changes

C.

Defined risk appetite

D.

Vulnerability scanning progress

Full Access
Question # 228

Which of the following would be MOST useful when determining the business continuity strategy for a large organization's data center?

A.

Stakeholder feedback analysis

B.

Business continuity risk analysis

C.

Incident root cause analysis

D.

Business impact analysis (BIA)

Full Access
Question # 229

An email digital signature will:

A.

protect the confidentiality of an email message.

B.

verify to recipient the integrity of an email message.

C.

automatically correct unauthorized modification of an email message.

D.

prevent unauthorized modification of an email message.

Full Access
Question # 230

Which of the following should be the FIRST step when performing triage of a malware incident?

A.

Containing the affected system

B.

Preserving the forensic image

C.

Comparing backup against production

D.

Removing the malware

Full Access
Question # 231

What is the role of the information security manager in finalizing contract negotiations with service providers?

A.

To perform a risk analysis on the outsourcing process

B.

To obtain a security standard certification from the provider

C.

To update security standards for the outsourced process

D.

To ensure that clauses for periodic audits are included

Full Access
Question # 232

Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?

A.

Service level agreement (SLA)

B.

Business continuity plan (BCP)

C.

Disaster recovery plan (DRP)

D.

Business impact analysis (BIA)

Full Access
Question # 233

During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:

A.

perform a risk assessment.

B.

review the state of security awareness.

C.

review information security policies.

D.

perform a gap analysis.

Full Access
Question # 234

Which of the following metrics would BEST demonstrate the success of a newly implemented information security framework?

A.

An increase in the number of identified security incidents

B.

A decrease in the number of security audit findings

C.

A decrease in the number of security policy exceptions

D.

An increase in the number of compliant business processes

Full Access
Question # 235

To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?

A.

Level of residual risk

B.

Level of risk treatment

C.

Configuration parameters

D.

Gap analysis results

Full Access
Question # 236

Which of the following is the BEST approach for data owners to use when defining access privileges for users?

    Define access privileges based on user roles.

    Adopt user account settings recommended by the vendor.

    Perform a risk assessment of the users' access privileges.

A.

Implement an identity and access management (IDM) tool.

Full Access
Question # 237

Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?

A.

Residual risk

B.

Regulatory requirements

C.

Risk tolerance

D.

Control objectives

Full Access