Month End Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CISM Certified Information Security Manager Questions and Answers

Questions 4

Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?

Options:

A.

Projected Increase in maturity level

B.

Estimated reduction in risk

C.

Projected costs over time

D.

Estimated increase in efficiency

Buy Now
Questions 5

Embedding security responsibilities into job descriptions is important PRIMARILY because it:

Options:

A.

supports access management.

B.

simplifies development of the security awareness program.

C.

aligns security to the human resources (HR) function.

D.

strengthens employee accountability.

Buy Now
Questions 6

Of the following, who is in the BEST position to evaluate business impacts?

Options:

A.

Senior management

B.

Information security manager

C.

IT manager

D.

Process manager

Buy Now
Questions 7

Which of the following activities MUST be performed by an information security manager for change requests?

Options:

A.

Perform penetration testing on affected systems.

B.

Scan IT systems for operating system vulnerabilities.

C.

Review change in business requirements for information security.

D.

Assess impact on information security risk.

Buy Now
Questions 8

Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?

Options:

A.

Place the web server in quarantine.

B.

Rebuild the server from the last verified backup.

C.

Shut down the server in an organized manner.

D.

Rebuild the server with relevant patches from the original media.

Buy Now
Questions 9

In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?

Options:

A.

Revise the policy.

B.

Perform a root cause analysis.

C.

Conduct a risk assessment,

D.

Communicate the acceptable use policy.

Buy Now
Questions 10

Which type of system is MOST effective for prioritizing cyber incidents based on impact and tracking them until they are closed?

Options:

A.

Security information and event management (SIEM)

B.

Extended detection and response (XDR)

C.

Endpoint detection and response (EDR)

D.

Network intrusion detection system (NIDS)

Buy Now
Questions 11

Information security controls should be designed PRIMARILY based on:

Options:

A.

a business impact analysis (BIA).

B.

regulatory requirements.

C.

business risk scenarios,

D.

a vulnerability assessment.

Buy Now
Questions 12

Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?

Options:

A.

Performing penetration tests against the network to demonstrate business vulnerability

B.

Highlighting competitor performance regarding network best security practices

C.

Demonstrating that targeted security controls tie to business objectives

D.

Presenting comparable security implementation estimates from several vendors

Buy Now
Questions 13

Which of the following has the GREATEST impact on efforts to improve an organization's security posture?

Options:

A.

Regular reporting to senior management

B.

Supportive tone at the top regarding security

C.

Automation of security controls

D.

Well-documented security policies and procedures

Buy Now
Questions 14

Application data integrity risk is MOST directly addressed by a design that includes:

Options:

A.

reconciliation routines such as checksums, hash totals, and record counts.

B.

strict application of an authorized data dictionary.

C.

application log requirements such as field-level audit trails and user activity logs.

D.

access control technologies such as role-based entitlements.

Buy Now
Questions 15

An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?

Options:

A.

Assess business impact against security risk.

B.

Provide security awareness training to customers.

C.

Refer to industry best practices.

D.

Quantify the security risk to the business.

Buy Now
Questions 16

A global organization is considering its geopolitical security risks. Which of the following is the information security manager's BEST approach?

Options:

A.

Seek advice from environmental and physical security experts

B.

Implement a third-party risk management framework

C.

Implement controls that deny access from specific jurisdictions

D.

Seek advice from enterprise risk and legal experts

Buy Now
Questions 17

Which of the following is MOST important to include in an information security status report to senior management?

Options:

A.

Key risk indicators (KRIs)

B.

Review of information security policies

C.

Information security budget requests

D.

List of recent security events

Buy Now
Questions 18

Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?

Options:

A.

Demonstrate the effectiveness of business continuity plans (BCPs).

B.

Report key performance indicator (KPI) trends.

C.

Demonstrate that the program enables business activities.

D.

Provide evidence of increased security events at peer organizations.

Buy Now
Questions 19

An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?

Options:

A.

Employees use smartphone tethering when accessing from remote locations.

B.

Employees physically lock PCs when leaving the immediate area.

C.

Employees are trained on the acceptable use policy.

D.

Employees use the VPN when accessing the organization's online resources.

Buy Now
Questions 20

The PRIMARY purpose for continuous monitoring of security controls is to ensure:

Options:

A.

control gaps are minimized.

B.

system availability.

C.

effectiveness of controls.

D.

alignment with compliance requirements.

Buy Now
Questions 21

Which of the following is the MOST important reason for obtaining input from risk owners when implementing controls?

Options:

A.

To reduce risk mitigation costs

B.

To resolve vulnerabilities in enterprise architecture (EA)

C.

To manage the risk to an acceptable level

D.

To eliminate threats impacting the business

Buy Now
Questions 22

A business continuity plan (BCP) should contain:

Options:

A.

Hardware and software inventories

B.

Data restoration procedures

C.

Information about eradication activities

D.

Criteria for activation

Buy Now
Questions 23

An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?

Options:

A.

Wipe the affected system.

B.

Notify internal legal counsel.

C.

Notify senior management.

D.

Isolate the impacted endpoints.

Buy Now
Questions 24

To help ensure that an information security training program is MOST effective, its contents should be:

Options:

A.

based on recent incidents.

B.

based on employees’ roles.

C.

aligned to business processes.

D.

focused on information security policy.

Buy Now
Questions 25

Which of the following is the MOST important reason for logging firewall activity?

Options:

A.

Metrics reporting

B.

Firewall tuning

C.

Intrusion prevention

D.

Incident investigation

Buy Now
Questions 26

Which of the following would be MOST helpful when creating information security policies?

Options:

A.

The information security framework

B.

Business impact analysis (BIA)

C.

Information security metrics

D.

Risk assessment results

Buy Now
Questions 27

A recovery point objective (RPO) is required in which of the following?

Options:

A.

Disaster recovery plan (DRP)

B.

Information security plan

C.

Incident response plan

D.

Business continuity plan (BCP)

Buy Now
Questions 28

Which of the following is MOST important to consider when aligning a security awareness program with the organization's business strategy?

Options:

A.

Regulations and standards

B.

People and culture

C.

Executive and board directives

D.

Processes and technology

Buy Now
Questions 29

Which of the following is the BEST option to lower the cost to implement application security controls?

Options:

A.

Perform security tests in the development environment.

B.

Integrate security activities within the development process

C.

Perform a risk analysis after project completion.

D.

Include standard application security requirements

Buy Now
Questions 30

Which of the following is the BEST indicator of an emerging incident?

Options:

A.

A weakness identified within an organization's information systems

B.

Customer complaints about lack of website availability

C.

A recent security incident at an industry competitor

D.

Attempted patching of systems resulting in errors

Buy Now
Questions 31

When investigating an information security incident, details of the incident should be shared:

Options:

A.

widely to demonstrate positive intent.

B.

only with management.

C.

only as needed,

D.

only with internal audit.

Buy Now
Questions 32

A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?

Options:

A.

Employee training on ransomware

B.

A properly tested offline backup system

C.

A continual server replication process

D.

A properly configured firewall

Buy Now
Questions 33

Which of the following BEST enables an information security manager to obtain organizational support for the implementation of security controls?

Options:

A.

Conducting periodic vulnerability assessments

B.

Communicating business impact analysis (BIA) results

C.

Establishing effective stakeholder relationships

D.

Defining the organization's risk management framework

Buy Now
Questions 34

Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?

Options:

A.

Risk owner

B.

Control tester

C.

IT compliance leader

D.

Information security manager

Buy Now
Questions 35

From a business perspective, the GREATEST benefit of an incident response plan is that it:

Options:

A.

Promotes efficiency by providing predefined response procedures

B.

Improves security responsiveness to disruptive events

C.

Limits the negative impact of disruptive events

D.

Ensures compliance with regulatory requirements

Buy Now
Questions 36

The PRIMARY goal of a post-incident review should be to:

Options:

A.

establish the cost of the incident to the business.

B.

determine why the incident occurred.

C.

identify policy changes to prevent a recurrence.

D.

determine how to improve the incident handling process.

Buy Now
Questions 37

An organization's research department plans to apply machine learning algorithms on a large data set containing customer names and purchase history. The risk of personal data leakage is considered high impact. Which of the following is the BEST risk treatment option in this situation?

Options:

A.

Accept the risk, as the benefits exceed the potential consequences.

B.

Mitigate the risk by applying anonymization on the data set.

C.

Transfer the risk by purchasing insurance.

D.

Mitigate the risk by encrypting the customer names in the data set.

Buy Now
Questions 38

Several months after the installation of a new firewall with intrusion prevention features to block malicious activity, a breach was discovered that came in through the firewall shortly after installation. This breach could have been detected earlier by implementing firewall:

Options:

A.

packet filtering.

B.

web surfing controls.

C.

log monitoring.

D.

application awareness.

Buy Now
Questions 39

An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:

Options:

A.

a control self-assessment (CSA) process.

B.

automated reporting to stakeholders.

C.

a monitoring process for the security policy.

D.

metrics for each milestone.

Buy Now
Questions 40

Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?

Options:

A.

Execution of unauthorized commands

B.

Prevention of authorized access

C.

Defacement of website content

D.

Unauthorized access to resources

Buy Now
Questions 41

Which of the following is the MOST effective way to ensure information security policies are understood?

Options:

A.

Implement a whistle-blower program.

B.

Provide regular security awareness training.

C.

Include security responsibilities in job descriptions.

D.

Document security procedures.

Buy Now
Questions 42

Which type of recovery site is MOST reliable and can support stringent recovery requirements?

Options:

A.

Cold site

B.

Warm site

C.

Hot site

D.

Mobile site

Buy Now
Questions 43

Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?

Options:

A.

A security information and event management (SIEM) system

B.

An intrusion prevention system (IPS)

C.

A virtual private network (VPN) with multi-factor authentication (MFA)

D.

An identity and access management (IAM) system

Buy Now
Questions 44

An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?

Options:

A.

Definition of when a disaster should be declared

B.

Requirements for regularly testing backups

C.

Recovery time objectives (RTOs)

D.

The disaster recovery communication plan

Buy Now
Questions 45

Which of the following is the MOST important consideration when determining which type of failover site to employ?

Options:

A.

Reciprocal agreements

B.

Disaster recovery test results

C.

Recovery time objectives (RTOs)

D.

Data retention requirements

Buy Now
Questions 46

If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:

Options:

A.

contact law enforcement.

B.

document the chain of custody.

C.

capture evidence using standard server-backup utilities.

D.

reboot affected machines in a secure area to search for evidence.

Buy Now
Questions 47

Which of the following will result in the MOST accurate controls assessment?

Options:

A.

Mature change management processes

B.

Senior management support

C.

Well-defined security policies

D.

Unannounced testing

Buy Now
Questions 48

The MOST important information for influencing management’s support of information security is:

Options:

A.

an demonstration of alignment with the business strategy.

B.

An identification of the overall threat landscape.

C.

A report of a successful attack on a competitor.

D.

An identification of organizational risks.

Buy Now
Questions 49

Which of the following is MOST helpful for protecting an enterprise from advanced persistent threats (APTs)?

Options:

A.

Updated security policies

B.

Defined security standards

C.

Threat intelligence

D.

Regular antivirus updates

Buy Now
Questions 50

Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?

Options:

A.

Conduct a business impact analysis (BIA).

B.

Conduct periodic awareness training.

C.

Perform a security gap analysis.

D.

Perform network penetration testing.

Buy Now
Questions 51

When collecting admissible evidence, which of the following is the MOST important requirement?

Options:

A.

Need to know

B.

Preserving audit logs

C.

Due diligence

D.

Chain of custody

Buy Now
Questions 52

A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?

Options:

A.

Mitigate

B.

Accept

C.

Transfer

D.

Avoid

Buy Now
Questions 53

Of the following, who is BEST suited to own the risk discovered in an application?

Options:

A.

Information security manager

B.

Senior management

C.

System owner

D.

Control owner

Buy Now
Questions 54

Which of the following business units should own the data that populates an identity management system?

Options:

A.

Human resources (HR)

B.

Legal

C.

Information technology

D.

Information security

Buy Now
Questions 55

Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?

Options:

A.

Documentation of control procedures

B.

Standardization of compliance requirements

C.

Automation of controls

D.

Integration of assurance efforts

Buy Now
Questions 56

Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?

Options:

A.

To improve awareness of information security

B.

To disclose the root cause of the incident

C.

To increase goodwill toward the organization

D.

To comply with regulations regarding notification

Buy Now
Questions 57

An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?

Options:

A.

Establishing the authority to remote wipe

B.

Developing security awareness training

C.

Requiring the backup of the organization's data by the user

D.

Monitoring how often the smartphone is used

Buy Now
Questions 58

Which of the following metrics is MOST appropriate for evaluating the incident notification process?

Options:

A.

Average total cost of downtime per reported incident

B.

Elapsed time between response and resolution

C.

Average number of incidents per reporting period

D.

Elapsed time between detection, reporting, and response

Buy Now
Questions 59

When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?

Options:

A.

Purchase forensic standard operating procedures.

B.

Provide forensics training to the information security team.

C.

Ensure the incident response policy allows hiring a forensics firm.

D.

Retain a forensics firm prior to experiencing an incident.

Buy Now
Questions 60

What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?

Options:

A.

Identify the data to be hosted.

B.

Perform a gap analysis.

C.

Perform a risk assessment.

D.

Analyze the business requirements.

Buy Now
Questions 61

Detailed business continuity plans (BCPs) should be PRIMARILY based on:

Options:

A.

strategies validated by senior management.

B.

capabilities of available local vendors.

C.

strategies that cover all applications.

D.

cost and resources needed to execute.

Buy Now
Questions 62

When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?

Options:

A.

Digital currency is immediately available.

B.

Network access requires two-factor authentication.

C.

Data backups are recoverable from an offsite location.

D.

An alternative network link is immediately available.

Buy Now
Questions 63

An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:

Options:

A.

organizational alignment

B.

IT strategy alignment

C.

threats to the organization

D.

existing control costs

Buy Now
Questions 64

Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?

Options:

A.

Review compliance requirements.

B.

Communicate the exposure.

C.

Declare an incident.

D.

Change the encryption keys.

Buy Now
Questions 65

Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?

Options:

A.

Include security requirements in the contract.

B.

Update the risk register.

C.

Consult with the business owner.

D.

Restrict application network access temporarily.

Buy Now
Questions 66

In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:

Options:

A.

evaluate results of the most recent incident response test.

B.

review the number of reported security incidents.

C.

ensure established security metrics are reported.

D.

assess progress of risk mitigation efforts.

Buy Now
Questions 67

Which of the following is CRITICAL to ensure the appropriate stakeholder makes decisions during a cybersecurity incident?

Options:

A.

Stakeholder plan

B.

Escalation plan

C.

Up-to-date risk register

D.

Asset classification

Buy Now
Questions 68

Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?

Options:

A.

Establish key risk indicators (KRIs).

B.

Use quantitative risk assessment methods.

C.

Provide regular reporting on risk treatment to senior management

D.

Require steering committee approval of risk treatment plans.

Buy Now
Questions 69

Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:

Options:

A.

review access rights as the acquisition integration occurs.

B.

perform a risk assessment of the access rights.

C.

escalate concerns for conflicting access rights to management.

D.

implement consistent access control standards.

Buy Now
Questions 70

Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?

Options:

A.

To alert on unacceptable risk

B.

To identify residual risk

C.

To reassess risk appetite

D.

To benchmark control performance

Buy Now
Questions 71

Which of the following is the BEST starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities?

Options:

A.

Controls analysis

B.

Emerging risk review

C.

Penetration testing

D.

Traffic monitoring

Buy Now
Questions 72

Which of the following should be established FIRST when implementing an information security governance framework?

Options:

A.

Security architecture

B.

Security policies

C.

Security incident management team

D.

Security awareness training program

Buy Now
Questions 73

Which of the following is MOST important when conducting a forensic investigation?

Options:

A.

Analyzing system memory

B.

Documenting analysis steps

C.

Capturing full system images

D.

Maintaining a chain of custody

Buy Now
Questions 74

Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?

Options:

A.

Define policies and standards for data processing.

B.

Implement applicable privacy principles

C.

Assess local or regional regulations

D.

Research cyber insurance policies

Buy Now
Questions 75

Which of the following is MOST important when designing an information security governance framework?

Options:

A.

Aligning with the information security strategy

B.

Assessing the availability of information security resources

C.

Aligning with industry best practice frameworks

D.

Assessing the current state of information security

Buy Now
Questions 76

An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?

Options:

A.

Standards

B.

Policies

C.

Guidelines

D.

Procedures

Buy Now
Questions 77

An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?

Options:

A.

Security requirements are included in the vendor contract

B.

External security audit results are reviewed.

C.

Service level agreements (SLAs) meet operational standards.

D.

Business continuity contingency planning is provided

Buy Now
Questions 78

Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?

Options:

A.

Backups are maintained offline and regularly tested.

B.

Impacted networks can be detached at the network switch level.

C.

Production data is continuously replicated between primary and secondary sites.

D.

Backups are maintained on multiple sites and regularly reviewed.

Buy Now
Questions 79

Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.

Which of the following should be the PRIMARY focus of Company A's information security manager?

Options:

A.

The organizational structure of Company B

B.

The cost to align to Company A's security policies

C.

Company A's security architecture

D.

Company B's security policies

Buy Now
Questions 80

Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?

Options:

A.

Availability of web application firewall logs.

B.

Capability of online virtual machine analysis

C.

Availability of current infrastructure documentation

D.

Capability to take a snapshot of virtual machines

Buy Now
Questions 81

An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?

Options:

A.

Conduct a risk assessment and share the result with senior management.

B.

Revise the incident response plan-to align with business processes.

C.

Provide incident response training to data custodians.

D.

Provide incident response training to data owners.

Buy Now
Questions 82

Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?

Options:

A.

Alignment with financial reporting

B.

Alignment with business initiatives

C.

Alignment with industry frameworks

D.

Alignment with risk appetite

Buy Now
Questions 83

Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?

Options:

A.

Senior management

B.

Application owner

C.

Information security manager

D.

Legal representative

Buy Now
Questions 84

Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?

Options:

A.

Right-to-audit clause

B.

The third party's incident response plan

C.

Service level agreement (SLA)

D.

The third party's business continuity plan (BCP)

Buy Now
Questions 85

An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?

Options:

A.

IT strategy

B.

Security architecture

C.

Business case

D.

Risk assessment

Buy Now
Questions 86

Which of the following is MOST appropriate to communicate to senior management regarding information risk?

Options:

A.

Emerging security technologies

B.

Risk profile changes

C.

Defined risk appetite

D.

Vulnerability scanning progress

Buy Now
Questions 87

Which of the following is the MOST important function of an information security steering committee?

Options:

A.

Assigning data classifications to organizational assets

B.

Developing organizational risk assessment processes

C.

Obtaining multiple perspectives from the business

D.

Defining security standards for logical access controls

Buy Now
Questions 88

A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?

Options:

A.

Update in accordance with the best business practices.

B.

Perform a risk assessment of the current IT environment.

C.

Gain an understanding of the current business direction.

D.

Inventory and review current security policies.

Buy Now
Questions 89

An organization has just updated its backup capability to a new cloud-based solution. Which of the following tests will MOST effectively verify this change is working as intended?

Options:

A.

Tabletop testing

B.

Black box testing

C.

Parallel testing

D.

Simulation testing

Buy Now
Questions 90

While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?

Options:

A.

The test is scheduled to reduce operational impact.

B.

The test involves IT members in the test process.

C.

The test addresses the critical components.

D.

The test simulates actual prime-time processing conditions.

Buy Now
Questions 91

What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?

Options:

A.

Perform a vulnerability assessment on the systems within the department.

B.

Introduce additional controls to force compliance with policy.

C.

Require department users to repeat security awareness training.

D.

Report the policy violation to senior management.

Buy Now
Questions 92

Which of the following is MOST important to include in an information security strategy?

Options:

A.

Stakeholder requirements

B.

Risk register

C.

Industry benchmarks

D.

Regulatory requirements

Buy Now
Questions 93

Implementing the principle of least privilege PRIMARILY requires the identification of:

Options:

A.

job duties

B.

data owners

C.

primary risk factors.

D.

authentication controls

Buy Now
Questions 94

While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?

Options:

A.

While responding to the incident

B.

During a tabletop exercise

C.

During post-incident review

D.

After a risk reassessment

Buy Now
Questions 95

An information security team has confirmed that threat actors are taking advantage of a newly announced critical vulnerability within an application. Which of the following should be done

FIRST?

Options:

A.

Install additional application controls.

B.

Notify senior management.

C.

Invoke the incident response plan.

D.

Prevent access to the application.

Buy Now
Questions 96

Which of the following analyses will BEST identify the external influences to an organization's information security?

Options:

A.

Business impact analysis (BIA)

B.

Gap analysis

C.

Threat analysis

D.

Vulnerability analysis

Buy Now
Questions 97

When analyzing the emerging risk and threat landscape, an information security manager should FIRST:

Options:

A.

determine the impact if threats materialize.

B.

determine the sources of emerging threats.

C.

review historical threats within the industry.

D.

map threats to business assets.

Buy Now
Questions 98

In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or

Options:

A.

Security budget

B.

Risk register

C.

Risk score

D.

Laws and regulations

Buy Now
Questions 99

Which of the following is MOST important to ensuring that incident management plans are executed effectively?

Options:

A.

Management support and approval has been obtained.

B.

The incident response team has the appropriate training.

C.

An incident response maturity assessment has been conducted.

D.

A reputable managed security services provider has been engaged.

Buy Now
Questions 100

Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?

Options:

A.

Impact on compliance risk.

B.

Inability to determine short-term impact.

C.

Impact on the risk culture.

D.

Deviation from risk management best practices

Buy Now
Questions 101

An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?

Options:

A.

Conduct user awareness training within the IT function.

B.

Propose that IT update information security policies and procedures.

C.

Determine the risk related to noncompliance with the policy.

D.

Request that internal audit conduct a review of the policy development process,

Buy Now
Questions 102

Which of the following is the PRIMARY objective of incident triage?

Options:

A.

Coordination of communications

B.

Mitigation of vulnerabilities

C.

Categorization of events

D.

Containment of threats

Buy Now
Questions 103

Which of the following is the BEST indication of an effective information security program?

Options:

A.

Risk is treated to an acceptable level.

B.

The number of security incidents reported by staff has increased.

C.

Key risk indicators (KRIs) are established.

D.

Policies are reviewed and approved by senior management.

Buy Now
Questions 104

Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?

Options:

A.

Update the vendor risk assessment.

B.

Engage legal counsel.

C.

Renegotiate the vendor contract.

D.

Terminate the relationship with the vendor.

Buy Now
Questions 105

A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?

Options:

A.

Ensure a risk assessment is performed to evaluate the findings

B.

Ensure vulnerabilities found are resolved within acceptable timeframes

C.

Request funding needed to resolve the top vulnerabilities

D.

Report findings to senior management

Buy Now
Questions 106

Which of the following metrics provides the BEST evidence of alignment of information security governance with corporate governance?

Options:

A.

Average return on investment (ROI) associated with security initiatives

B.

Average number of security incidents across business units

C.

Mean time to resolution (MTTR) for enterprise-wide security incidents

D.

Number of vulnerabilities identified for high-risk information assets

Buy Now
Questions 107

Which of the following should be the MOST important consideration when establishing information security policies for an organization?

Options:

A.

Job descriptions include requirements to read security policies.

B.

The policies are updated annually.

C.

Senior management supports the policies.

D.

The policies are aligned to industry best practices.

Buy Now
Questions 108

Which of the following is MOST important when developing an information security strategy?

Options:

A.

Engage stakeholders.

B.

Assign data ownership.

C.

Determine information types.

D.

Classify information assets.

Buy Now
Questions 109

What is the PRIMARY objective of performing a vulnerability assessment following a business system update?

Options:

A.

Determine operational losses.

B.

Improve the change control process.

C.

Update the threat landscape.

D.

Review the effectiveness of controls

Buy Now
Questions 110

Which of the following is MOST important to determine following the discovery and eradication of a malware attack?

Options:

A.

The malware entry path

B.

The creator of the malware

C.

The type of malware involved

D.

The method of detecting the malware

Buy Now
Questions 111

Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?

Options:

A.

Implement compensating controls.

B.

Communicate consequences for future instances.

C.

Enhance the data loss prevention (DLP) solution.

D.

Improve the security awareness training program.

Buy Now
Questions 112

Who is accountable for approving an information security governance framework?

Options:

A.

The board of directors

B.

The chief information security officer (ClSO)

C.

The enterprise risk committee

D.

The chief information officer (CIO)

Buy Now
Questions 113

Which of the following would BEST ensure that security is integrated during application development?

Options:

A.

Employing global security standards during development processes

B.

Providing training on secure development practices to programmers

C.

Performing application security testing during acceptance testing

D.

Introducing security requirements during the initiation phase

Buy Now
Questions 114

Which of the following is the MOST important objective of post-incident review activities?

Options:

A.

Evidence collection

B.

Continuous improvement

C.

Incident triage

D.

Incident documentation

Buy Now
Questions 115

Which of the following is the MOST important consideration when briefing executives about the current state of the information security program?

Options:

A.

Including a situational forecast

B.

Using appropriate language for the target audience

C.

Including trend charts for metrics

D.

Using a rating system to demonstrate program effectiveness

Buy Now
Questions 116

Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?

Options:

A.

It transfers the risk associated with recovery to a third party.

B.

It lowers the annual cost to the business.

C.

It eliminates the need to maintain offsite facilities.

D.

It eliminates the need for the business to perform testing.

Buy Now
Questions 117

To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?

Options:

A.

Data storage procedures

B.

Data classification policy

C.

Results of penetration testing

D.

Features of data protection products

Buy Now
Questions 118

Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?

Options:

A.

Implement a mobile device policy and standard.

B.

Provide employee training on secure mobile device practices.

C.

Implement a mobile device management (MDM) solution.

D.

Require employees to install an effective anti-malware app.

Buy Now
Questions 119

The effectiveness of an incident response team will be GREATEST when:

Options:

A.

the incident response team meets on a regular basis to review log files.

B.

the incident response team members are trained security personnel.

C.

the incident response process is updated based on lessons learned.

D.

incidents are identified using a security information and event monitoring {SIEM) system.

Buy Now
Questions 120

Which of the following should be the NEXT step after a security incident has been reported?

Options:

A.

Recovery

B.

Investigation

C.

Escalation

D.

Containment

Buy Now
Questions 121

Which of the following is the BEST method to ensure compliance with password standards?

Options:

A.

Implementing password-synchronization software

B.

Using password-cracking software

C.

Automated enforcement of password syntax rules

D.

A user-awareness program

Buy Now
Questions 122

Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?

Options:

A.

Senior management

B.

Information owner

C.

Business manager

D.

Information security manager

Buy Now
Questions 123

Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?

Options:

A.

Providing ongoing training to the incident response team

B.

Implementing proactive systems monitoring

C.

Implementing a honeypot environment

D.

Updating information security awareness materials

Buy Now
Questions 124

Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?

Options:

A.

Suspend the data exchange with the provider

B.

Notify appropriate regulatory authorities of the breach.

C.

Initiate the business continuity plan (BCP)

D.

Validate the breach with the provider

Buy Now
Questions 125

Which of the following is the PRIMARY objective of a cyber resilience strategy?

Options:

A.

Business continuity

B.

Regulatory compliance

C.

Employee awareness

D.

Executive support

Buy Now
Questions 126

Which of the following risk responses is an example of risk transfer?

Options:

A.

Utilizing third-party applications

B.

Purchasing cybersecurity insurance

C.

Moving risk ownership to another department

D.

Conducting off-site backups

Buy Now
Questions 127

Which of the following is the PRIMARY reason to conduct a post-incident review?

Options:

A.

To aid in future risk assessments

B.

To improve the response process

C.

To determine whether digital evidence is admissible

D.

To notify regulatory authorities

Buy Now
Questions 128

Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?

Options:

A.

Security metrics

B.

Security baselines

C.

Security incident details

D.

Security risk exposure

Buy Now
Questions 129

When integrating security risk management into an organization it is MOST important to ensure:

Options:

A.

business units approve the risk management methodology.

B.

the risk treatment process is defined.

C.

information security policies are documented and understood.

D.

the risk management methodology follows an established framework.

Buy Now
Questions 130

When developing a categorization method for security incidents, the categories MUST:

Options:

A.

align with industry standards.

B.

be created by the incident handler.

C.

have agreed-upon definitions.

D.

align with reporting requirements.

Buy Now
Questions 131

A multinational organization is introducing a security governance framework. The information security manager's concern is that regional security practices differ. Which of the following should be evaluated FIRST?

Options:

A.

Local regulatory requirements

B.

Global framework standards

C.

Cross-border data mobility

D.

Training requirements of the framework

Buy Now
Questions 132

Which of the following parties should be responsible for determining access levels to an application that processes client information?

Options:

A.

The business client

B.

The information security tear

C.

The identity and access management team

D.

Business unit management

Buy Now
Questions 133

An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?

Options:

A.

Perform a gap analysis.

B.

Consult with senior management on the best course of action.

C.

Implement a program of work to comply with the new legislation.

D.

Understand the cost of noncompliance.

Buy Now
Questions 134

An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?

Options:

A.

Determine whether the organization can benefit from adopting the new standard.

B.

Obtain legal counsel's opinion on the standard's applicability to regulations,

C.

Perform a risk assessment on the new technology.

D.

Review industry specialists’ analyses of the new standard.

Buy Now
Questions 135

An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?

Options:

A.

Provide additional training to the incident response team.

B.

Review the incident management procedures.

C.

Interview the incident response team.

D.

Remove the steps from the incident management procedures.

Buy Now
Questions 136

Which of the following is MOST important when responding to a major security incident?

Options:

A.

Contacting forensic investigators

B.

Following the escalation process

C.

Notifying law enforcement

D.

Identifying the indicators of compromise

Buy Now
Questions 137

Prior to conducting a forensic examination, an information security manager should:

Options:

A.

boot the original hard disk on a clean system.

B.

create an image of the original data on new media.

C.

duplicate data from the backup media.

D.

shut down and relocate the server.

Buy Now
Questions 138

When defining a security baseline, it is MOST important that the baseline:

Options:

A.

can vary depending on the security classification of systems.

B.

is uniform for all assets of the same type.

C.

is developed based on stakeholder consensus.

D.

aligns to key risk indicators (KRIs).

Buy Now
Questions 139

When determining an acceptable risk level which of the following is the MOST important consideration?

Options:

A.

Threat profiles

B.

System criticalities

C.

Vulnerability scores

D.

Risk matrices

Buy Now
Questions 140

Which of the following is the MOST effective way to demonstrate alignment of information security strategy with business objectives?

Options:

A.

Balanced scorecard

B.

Risk matrix

C.

Benchmarking

D.

Heat map

Buy Now
Questions 141

Which of the following should an information security manager do FIRST when noncompliance with security standards is identified?

Options:

A.

Report the noncompliance to senior management.

B.

Validate the noncompliance.

C.

Include the noncompliance in the risk register.

D.

Implement compensating controls to mitigate the noncompliance.

Buy Now
Questions 142

Which of the following processes is MOST important for the success of a business continuity plan (BCP)?

Options:

A.

Involving all stakeholders in testing and training

B.

Scheduling periodic internal and external audits

C.

Including the board and senior management in plan reviews

D.

Maintaining copies of the plan at the primary and recovery sites

Buy Now
Questions 143

Which of the following is the MOST important requirement for a successful security program?

Options:

A.

Mapping security processes to baseline security standards

B.

Penetration testing on key systems

C.

Management decision on asset value

D.

Nondisclosure agreements (NDA) with employees

Buy Now
Questions 144

Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?

Options:

A.

Reducing the number of vulnerabilities detected

B.

Ensuring the amount of residual risk is acceptable

C.

Avoiding identified system threats

D.

Complying with regulatory requirements

Buy Now
Questions 145

An email digital signature will:

Options:

A.

protect the confidentiality of an email message.

B.

verify to recipient the integrity of an email message.

C.

automatically correct unauthorized modification of an email message.

D.

prevent unauthorized modification of an email message.

Buy Now
Questions 146

Which of the following BEST protects against emerging advanced persistent threat (APT) actors?

Options:

A.

Honeypot environment

B.

Updated security awareness materials

C.

Ongoing incident response training

D.

Proactive monitoring

Buy Now
Questions 147

Which of the following is the BEST justification for making a revision to a password policy?

Options:

A.

Vendor recommendation

B.

Audit recommendation

C.

A risk assessment

D.

Industry best practice

Buy Now
Questions 148

An information security manager has identified that security risks are not being treated in a timely manner. Which of the following

Options:

A.

Provide regular updates about the current state of the risks.

B.

Re-perform risk analysis at regular intervals.

C.

Assign a risk owner to each risk

D.

Create mitigating controls to manage the risks.

Buy Now
Questions 149

Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?

Options:

A.

Embedding compliance requirements within operational processes

B.

Engaging external experts to provide guidance on changes in compliance requirements

C.

Performing periodic audits for compliance with legal and regulatory requirements

D.

Assigning the operations manager accountability for meeting compliance requirements

Buy Now
Questions 150

Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?

Options:

A.

Revise the procurement process.

B.

Update the change management process.

C.

Discuss the issue with senior leadership.

D.

Remove the application from production.

Buy Now
Questions 151

Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?

Options:

A.

Communicate disciplinary processes for policy violations.

B.

Require staff to participate in information security awareness training.

C.

Require staff to sign confidentiality agreements.

D.

Include information security responsibilities in job descriptions.

Buy Now
Questions 152

Which of the following BEST minimizes information security risk in deploying applications to the production environment?

Options:

A.

Integrating security controls in each phase of the life cycle

B.

Conducting penetration testing post implementation

C.

Having a well-defined change process

D.

Verifying security during the testing process

Buy Now
Questions 153

An organization has determined that fixing a security vulnerability in a critical application is too costly to be feasible, but the impact is material to the business. Which of the following is the MOST appropriate risk treatment?

Options:

A.

Purchase cybersecurity insurance.

B.

Accept the risk associated with continued use of the application.

C.

Implement compensating controls for the application.

D.

Discontinue using the application.

Buy Now
Questions 154

Which of the following BEST helps to enable the desired information security culture within an organization?

Options:

A.

Information security awareness training and campaigns

B.

Effective information security policies and procedures

C.

Delegation of information security roles and responsibilities

D.

Incentives for appropriate information security-related behavior

Buy Now
Questions 155

Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?

Options:

A.

Impact of service interruption

B.

Results of recovery testing

C.

Determination of recovery point objective (RPO)

D.

Direction from senior management

Buy Now
Questions 156

Which of the following is MOST important to maintain integration among the incident response plan, business continuity plan (BCP). and disaster recovery plan (DRP)?

Options:

A.

Asset classification

B.

Recovery time objectives (RTOs)

C.

Chain of custody

D.

Escalation procedures

Buy Now
Questions 157

When developing an asset classification program, which of the following steps should be completed FIRST?

Options:

A.

Categorize each asset.

B.

Create an inventory. &

C.

Create a business case for a digital rights management tool.

D.

Implement a data loss prevention (OLP) system.

Buy Now
Questions 158

Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?

Options:

A.

Capability maturity model

B.

Vulnerability assessment

C.

IT security risk and exposure

D.

Business impact analysis (BIA)

Buy Now
Questions 159

Which of the following should be the PRIMARY objective of the information security incident response process?

Options:

A.

Conducting incident triage

B.

Communicating with internal and external parties

C.

Minimizing negative impact to critical operations

D.

Classifying incidents

Buy Now
Questions 160

Which of the following is MOST important for an information security manager to consider when reviewing a security investment plan?

Options:

A.

The plan has summarized IT costs for implementation.

B.

The plan resolves all potential threats to business processes.

C.

The plan focuses on meeting industry best practices and industry standards.

D.

The plan is based on a review of threats and vulnerabilities.

Buy Now
Questions 161

Which of the following is MOST important to the effectiveness of an information security steering committee?

Options:

A.

The committee has strong regulatory knowledge.

B.

The committee is comprised of representatives from senior management.

C.

The committee has cross-organizational representation.

D.

The committee uses a risk management framework.

Buy Now
Questions 162

Which of the following is MOST important when designing security controls for new cloud-based services?

Options:

A.

Evaluating different types of deployment models according to the associated risks

B.

Understanding the business and IT strategy for moving resources to the cloud

C.

Defining an incident response policy to protect data moving between onsite and cloud applications

D.

Performing a business impact analysis (BIA) to gather information needed to develop recovery strategies

Buy Now
Questions 163

Senior management is concerned about data exposure through the use of public Al services. Which of the following is the information security manager's BEST course of action?

Options:

A.

Train all employees on the appropriate use of public Al services and confidential data.

B.

Disable access to public Al from company devices.

C.

Perform a risk assessment of public Al with appropriate recommendations for senior management.

D.

Perform a business impact analysis (BIA) of public Al.

Buy Now
Questions 164

Which of the following is MOST important for the effective implementation of an information security governance program?

Options:

A.

Employees receive customized information security training

B.

The program budget is approved and monitored by senior management

C.

The program goals are communicated and understood by the organization.

D.

Information security roles and responsibilities are documented.

Buy Now
Questions 165

Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?

Options:

A.

Enterprise risk committee

B.

Information security steering committee

C.

Data privacy officer (DPO)

D.

Chief information security officer (CISO)

Buy Now
Questions 166

Recovery time objectives (RTOs) are an output of which of the following?

Options:

A.

Business continuity plan (BCP)

B.

Disaster recovery plan (DRP)

C.

Service level agreement (SLA)

D.

Business impact analysis (BIA)

Buy Now
Questions 167

When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?

Options:

A.

Data is encrypted in transit and at rest at the vendor site.

B.

Data is subject to regular access log review.

C.

The vendor must be able to amend data.

D.

The vendor must agree to the organization's information security policy,

Buy Now
Questions 168

Which of the following should be the PRIMARY basis for determining the value of assets?

Options:

A.

Cost of replacing the assets

B.

Business cost when assets are not available

C.

Original cost of the assets minus depreciation

D.

Total cost of ownership (TCO)

Buy Now
Questions 169

An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?

Options:

A.

Perform a business impact analysis (BIA).

B.

Notify local law enforcement agencies of a breach.

C.

Activate the incident response program.

D.

Validate the risk to the organization.

Buy Now
Questions 170

Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?

Options:

A.

Establish an information security steering committee.

B.

Employ a process-based approach for information asset classification.

C.

Utilize an industry-recognized risk management framework.

D.

Provide security awareness training to board executives.

Buy Now
Questions 171

Which of the following BEST prepares a computer incident response team for a variety of information security scenarios?

Options:

A.

Forensics certification

B.

Disaster recovery drills

C.

Tabletop exercises

D.

Penetration tests

Buy Now
Questions 172

The PRIMARY advantage of single sign-on (SSO) is that it will:

Options:

A.

increase efficiency of access management

B.

increase the security of related applications.

C.

strengthen user passwords.

D.

support multiple authentication mechanisms.

Buy Now
Questions 173

An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?

Options:

A.

Internal IT audit

B.

The data custodian

C.

The information security manager

D.

The data owner

Buy Now
Questions 174

Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?

Options:

A.

Number of blocked intrusion attempts

B.

Number of business cases reviewed by senior management

C.

Trends in the number of identified threats to the business

D.

Percentage of controls integrated into business processes

Buy Now
Questions 175

Which of the following is MOST important in increasing the effectiveness of incident responders?

Options:

A.

Communicating with the management team

B.

Integrating staff with the IT department

C.

Testing response scenarios

D.

Reviewing the incident response plan annually

Buy Now
Questions 176

Which of the following is the MOST effective way to detect security incidents?

Options:

A.

Analyze recent security risk assessments.

B.

Analyze security anomalies.

C.

Analyze penetration test results.

D.

Analyze vulnerability assessments.

Buy Now
Questions 177

An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:

Options:

A.

perform a gap analysis.

B.

implement both companies' policies separately

C.

merge both companies' policies

D.

perform a vulnerability assessment

Buy Now
Questions 178

Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?

Options:

A.

To identify the organization's risk tolerance

B.

To improve security processes

C.

To align security roles and responsibilities

D.

To optimize security risk management

Buy Now
Questions 179

An organization has identified a large volume of old data that appears to be unused. Which of the following should the information

security manager do NEXT?

Options:

A.

Consult the record retention policy.

B.

Update the awareness and training program.

C.

Implement media sanitization procedures.

D.

Consult the backup and recovery policy.

Buy Now
Questions 180

Which of the following BEST indicates misalignment of security policies with business objectives?

Options:

A.

Low completion rate of employee awareness training

B.

Lack of adequate funding for the security program

C.

A large number of long-term policy exceptions

D.

A large number of user noncompliance incidents

Buy Now
Questions 181

An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:

Options:

A.

disable the user's access to corporate resources.

B.

terminate the device connectivity.

C.

remotely wipe the device

D.

escalate to the user's management

Buy Now
Questions 182

The department head of application development has decided to accept the risks identified in a recent assessment. No recommendations will be implemented, even though the recommendations are required by regulatory oversight. What should the information security manager do NEXT?

Options:

A.

Review the risk monitoring plan.

B.

Formally document the decision.

C.

Review the regulations.

D.

Advise the risk management team.

Buy Now
Questions 183

Which of the following would BEST ensure that security risk assessment is integrated into the life cycle of major IT projects?

Options:

A.

Training project managers on risk assessment

B.

Having the information security manager participate on the project steering committees

C.

Applying global security standards to the IT projects

D.

Integrating the risk assessment into the internal audit program

Buy Now
Questions 184

Which of the following BEST supports investments in an information security program?

Options:

A.

Business cases

B.

Business impact analysis (BIA)

C.

Gap analysis results

D.

Risk assessment results

Buy Now
Questions 185

Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?

Options:

A.

Metrics to drive the information security program

B.

Information security policies

C.

A defined security organizational structure

D.

An information security strategy

Buy Now
Questions 186

The PRIMARY purpose of vulnerability identification is to:

Options:

A.

Remediate vulnerabilities before they are exploited

B.

Discover control deficiencies

C.

Provide vulnerability identifiers for risk reporting

D.

Prioritize vulnerability remediation

Buy Now
Questions 187

Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?

Options:

A.

Security policy

B.

Risk management framework

C.

Risk appetite

D.

Security standards

Buy Now
Questions 188

Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?

Options:

A.

To ensure industry best practices for enterprise security are followed

B.

To establish the minimum level of controls needed

C.

To determine the desired state of enterprise security

D.

To satisfy auditors' recommendations for enterprise security

Buy Now
Questions 189

Which of the following provides the MOST effective response against ransomware attacks?

Options:

A.

Automatic quarantine of systems

B.

Thorough communication plans

C.

Effective backup plans and processes

D.

Strong password requirements

Buy Now
Questions 190

Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?

Options:

A.

Business impact analysis (BIA)

B.

Risk register

C.

Penetration testing

D.

Vulnerability assessment

Buy Now
Questions 191

The BEST way to integrate information security governance with corporate governance is to ensure:

Options:

A.

the information security steering committee monitors compliance with security policies.

B.

management teams embed information security into business processes.

C.

awareness programs include industry best practice for information security governance.

D.

the information security program is included in regular external audits.

Buy Now
Questions 192

Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?

Options:

A.

A capability and maturity assessment

B.

Detailed analysis of security program KPIs

C.

An information security dashboard

D.

An information security risk register

Buy Now
Questions 193

Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?

Options:

A.

Legal and regulatory requirements

B.

Likelihood of a disaster

C.

Organizational tolerance to service interruption

D.

Geographical location of the backup site

Buy Now
Questions 194

Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?

Options:

A.

Perform a risk analysis for critical applications.

B.

Determine whether critical success factors (CSFs) have been defined.

C.

Conduct a capability maturity model evaluation.

D.

Review and update current operational procedures.

Buy Now
Questions 195

Which of the following is the PRIMARY responsibility of the information security function when an organization adopts emerging technologies?

Options:

A.

Developing security training for the new technologies

B.

Designing new security controls

C.

Creating an acceptable use policy for the technologies

D.

Assessing the potential security risk

Buy Now
Questions 196

Which of the following is the BEST tool to monitor the effectiveness of information security governance?

Options:

A.

Key performance indicators (KPIs)

B.

Balanced scorecard

C.

Business impact analysis (BIA)

D.

Risk profile

Buy Now
Questions 197

Which of the following would BEST support the business case for an increase in the information security budget?

Options:

A.

Cost-benefit analysis results

B.

Comparison of information security budgets with peer organizations

C.

Business impact analysis (BIA) results

D.

Frequency of information security incidents

Buy Now
Questions 198

An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?

Options:

A.

Requirement for regular information security awareness

B.

Right-to-audit clause

C.

Service level agreement (SLA)

D.

Requirement to comply with corporate security policy

Buy Now
Questions 199

An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?

Options:

A.

Implement a SIEM solution.

B.

Perform a threat analysis.

C.

Establish performance metrics for the team.

D.

Perform a post-incident review.

Buy Now
Questions 200

A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?

Options:

A.

Information security manager

B.

Security policy author

C.

Creator of the document

D.

Data custodian

Buy Now
Questions 201

What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?

Options:

A.

Define the issues to be addressed.

B.

Perform a cost-benefit analysis.

C.

Calculate the total cost of ownership (TCO).

D.

Conduct a feasibility study.

Buy Now
Questions 202

What is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?

Options:

A.

To share responsibility for addressing security breaches

B.

To gain acceptance of the policy across the organization

C.

To decrease the workload of the IT department

D.

To reduce the overall cost of policy development

Buy Now
Questions 203

When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?

Options:

A.

Business impact analysis (BIA) results

B.

Key performance indicators (KPIs)

C.

Recovery procedures

D.

Systems inventory

Buy Now
Questions 204

While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?

Options:

A.

Assign responsibility to the database administrator (DBA).

B.

Review the databases for sensitive content.

C.

Prepare a report of the databases for senior management.

D.

Assign the highest classification level to those databases.

Buy Now
Questions 205

The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:

Options:

A.

cause fewer potential production issues.

B.

require less IT staff preparation.

C.

simulate real-world attacks.

D.

identify more threats.

Buy Now
Questions 206

What should be an information security manager's MOST important consideration when developing a multi-year plan?

Options:

A.

Ensuring contingency plans are in place for potential information security risks

B.

Ensuring alignment with the plans of other business units

C.

Allowing the information security program to expand its capabilities

D.

Demonstrating projected budget increases year after year

Buy Now
Questions 207

Which of the following should be done FIRST when a SIEM flags a potential event?

Options:

A.

Validate the event is not a false positive.

B.

Initiate the incident response plan.

C.

Escalate the event to the business owner.

D.

Implement compensating controls.

Buy Now
Questions 208

Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?

Options:

A.

Perform a risk assessment.

B.

Reduce security hardening settings.

C.

Inform business management of the risk.

D.

Document a security exception.

Buy Now
Questions 209

Data entry functions for a web-based application have been outsourced to a third-party service provider who will work from a remote site Which of the following issues would be of GREATEST concern to an information security manager?

Options:

A.

The application does not use a secure communications protocol

B.

The application is configured with restrictive access controls

C.

The business process has only one level of error checking

D.

Server-based malware protection is not enforced

Buy Now
Questions 210

An organization is MOST likely to accept the risk of noncompliance with a new regulatory requirement when:

Options:

A.

employees are resistant to the controls required by the new regulation.

B.

the regulatory requirement conflicts with business requirements.

C.

the risk of noncompliance exceeds the organization's risk appetite.

D.

the cost of complying with the regulation exceeds the potential penalties.

Buy Now
Questions 211

An organization learns that a third party has outsourced critical functions to another external provider. Which of the following is the information security manager's MOST important course of action?

Options:

A.

Engage an independent audit of the third party's external provider.

B.

Recommend canceling the contract with the third party.

C.

Evaluate the third party's agreements with its external provider.

D.

Conduct an external audit of the contracted third party.

Buy Now
Questions 212

Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?

Options:

A.

Clearer segregation of duties

B.

Increased user productivity

C.

Increased accountability

D.

Fewer security incidents

Buy Now
Questions 213

The PRIMARY goal when conducting post-incident reviews is to identify:

Options:

A.

Additional cybersecurity budget needs

B.

Weaknesses in incident response plans

C.

Information to be shared with senior management

D.

Individuals that need additional training

Buy Now
Questions 214

The PRIMARY consideration when responding to a ransomware attack should be to ensure:

Options:

A.

backups are available.

B.

the most recent patches have been applied.

C.

the ransomware attack is contained

D.

the business can operate

Buy Now
Questions 215

Which of the following is the MOST effective way to identify changes in an information security environment?

Options:

A.

Business impact analysis (BIA)

B.

Annual risk assessments

C.

Regular penetration testing

D.

Continuous monitoring

Buy Now
Questions 216

Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?

Options:

A.

Residual risk

B.

Regulatory requirements

C.

Risk tolerance

D.

Control objectives

Buy Now
Questions 217

An organization has an ongoing security awareness training program. Employee participation has been decreasing over the year, while the number of malware and phishing incidents from email has been increasing. What is the information security manager's BEST course of action?

Options:

A.

Report the findings to senior management with recommendations.

B.

Implement a phishing reporting tool in the email system.

C.

Include regular phishing campaigns after each training session.

D.

Make the training program mandatory for all employees.

Buy Now
Questions 218

To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:

Options:

A.

rely on senior management to enforce security.

B.

promote the relevance and contribution of security.

C.

focus on compliance.

D.

reiterate the necessity of security.

Buy Now
Questions 219

Which of the following BEST enables an organization to operate smoothly with reduced capacities when service has been disrupted?

Options:

A.

Crisis management plan

B.

Disaster recovery plan (DRP)

C.

Incident response plan

D.

Business continuity plan (BCP)

Buy Now
Questions 220

Which of the following is the FIRST step in developing a business continuity plan (BCP)?

Options:

A.

Determine the business recovery strategy

B.

Determine available resources.

C.

Identify the applications with the shortest recovery time objectives (RTOs).

D.

Identify critical business processes.

Buy Now
Questions 221

Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?

Options:

A.

An industry peer experienced a recent breach with a similar application.

B.

The system can be replicated for additional use cases.

C.

The cost of implementing the system is less than the impact of downtime.

D.

The solution is within the organization's risk tolerance.

Buy Now
Questions 222

A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:

Options:

A.

incident has been confirmed.

B.

incident has been contained.

C.

potential incident has been logged.

D.

incident has been mitigated.

Buy Now
Questions 223

Which of the following is the MOST critical input to developing policies, standards, and procedures to secure information assets?

Options:

A.

Vulnerability assessment

B.

Industry best practices

C.

Regulatory requirements

D.

Enterprise goals

Buy Now
Questions 224

An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?

Options:

A.

Data masking

B.

Data retention strategy

C.

Data encryption standards

D.

Data loss prevention (DLP)

Buy Now
Questions 225

Which of the following is the FIRST step when conducting a post-incident review?

Options:

A.

Identify mitigating controls.

B.

Assess the costs of the incident.

C.

Perform root cause analysis.

D.

Assign responsibility for corrective actions.

Buy Now
Questions 226

Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?

Options:

A.

Block IP addresses used by the attacker

B.

Redirect the attacker's traffic

C.

Disable firewall ports exploited by the attacker.

D.

Power off affected servers

Buy Now
Questions 227

How does an incident response team BEST leverage the results of a business impact analysis (BIA)?

Options:

A.

Assigning restoration priority during incidents

B.

Determining total cost of ownership (TCO)

C.

Evaluating vendors critical to business recovery

D.

Calculating residual risk after the incident recovery phase

Buy Now
Questions 228

Which of the following will ensure confidentiality of content when accessing an email system over the Internet?

Options:

A.

Multi-factor authentication

B.

Digital encryption

C.

Data masking

D.

Digital signatures

Buy Now
Questions 229

Which of the following is the GREATEST benefit of using AI tools in security operations?

Options:

A.

Rapid detection and response to threats

B.

Prioritized vulnerabilities

C.

Reduced time and effort required to patch systems

D.

Defined risk tolerance

Buy Now
Questions 230

To ensure that a new application complies with information security policy, the BEST approach is to:

Options:

A.

review the security of the application before implementation.

B.

integrate functionality the development stage.

C.

perform a vulnerability analysis.

D.

periodically audit the security of the application.

Buy Now
Questions 231

Which type of policy BEST helps to ensure that all employees, contractors, and third-party users receive formal communication regarding an organization’s security program?

Options:

A.

Management review policy

B.

Business continuity management policy

C.

Information security training policy

D.

Security incident management policy

Buy Now
Questions 232

The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:

Options:

A.

scope of the business continuity program.

B.

resources needed for business recovery.

C.

recovery time objective (RTO).

D.

scope of the incident response plan.

Buy Now
Questions 233

Which of the following should be of GREATEST concern to an information security manager when evaluating a cloud service provider?

Options:

A.

Data retention policies are not documented

B.

There is no right to audit the security of the provider

C.

The provider is new to the market and lacks references

D.

Security controls offered by the provider are inadequate

Buy Now
Questions 234

Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?

Options:

A.

Internal security audit

B.

External security audit

C.

Organizational risk appetite

D.

Business impact analysis (BIA)

Buy Now
Questions 235

A security incident has been reported within an organization. When should an information security manager contact the information owner?

Options:

A.

After the incident has been contained

B.

After the incident has been mitigated

C.

After the incident has been confirmed

D.

After the potential incident has been logged

Buy Now
Questions 236

A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is

Options:

A.

the risk assessment has not defined the likelihood of occurrence

B.

the reported vulnerability has not been validated

C.

executive management is not aware of the impact potential

D.

the cost of implementing controls exceeds the potential financial losses.

Buy Now
Questions 237

Once a suite of security controls has been successfully implemented for an organization's business units, it is MOST important for the information security manager to:

Options:

A.

hand over the controls to the relevant business owners.

B.

ensure the controls are regularly tested for ongoing effectiveness.

C.

perform testing to compare control performance against industry levels.

D.

prepare to adapt the controls for future system upgrades.

Buy Now
Questions 238

Which of the following would provide the BEST evidence to senior management that security control performance has improved?

Options:

A.

Demonstrated return on security investment

B.

Reduction in inherent risk

C.

Results of an emerging threat analysis

D.

Review of security metrics trends

Buy Now
Questions 239

Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?

Options:

A.

Statistical reports will be incorrect.

B.

The service desk will be staffed incorrectly.

C.

Escalation procedures will be ineffective.

D.

Timely detection of attacks will be impossible.

Buy Now
Questions 240

A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?

Options:

A.

The time and location that the breach occurred

B.

Evidence of previous incidents caused by the user

C.

The underlying reason for the user error

D.

Appropriate disciplinary procedures for user error

Buy Now
Questions 241

Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?

Options:

A.

Compromise of critical assets via third-party resources

B.

Unavailability of services provided by a supplier

C.

Loss of customers due to unavailability of products

D.

Unreliable delivery of hardware and software resources by a supplier

Buy Now
Questions 242

Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?

Options:

A.

Focus on addressing conflicts between security and performance.

B.

Collaborate with business and IT functions in determining controls.

C.

Include information security requirements in the change control process.

D.

Obtain assistance from IT to implement automated security cantrals.

Buy Now
Questions 243

Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?

Options:

A.

Walk-through of the incident response plan

B.

Black box penetration test

C.

Simulated phishing exercise

D.

Red team exercise

Buy Now
Questions 244

Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?

Options:

A.

Storing the plan at an offsite location

B.

Communicating the plan to all stakeholders

C.

Updating the plan periodically

D.

Conducting a walk-through of the plan

Buy Now
Questions 245

During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?

Options:

A.

The certification includes industry-recognized security controls.

B.

The certification was issued within the last five years.

C.

The certification is issued for the specific scope.

D.

The certification is easily verified.

Buy Now
Questions 246

Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?

Options:

A.

Ensuring the continued resilience and security of IT services

B.

Decreasing the percentage of security deployments that cause failures in production

C.

Reducing the number of control assessments to optimize resources

D.

Identifying and addressing security team performance issues

Buy Now
Questions 247

An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?

Options:

A.

Conduct phishing awareness training.

B.

Implement disciplinary procedures.

C.

Establish an acceptable use policy.

D.

Assess and update spam filtering rules.

Buy Now
Questions 248

Which of the following BEST facilitates the effective execution of an incident response plan?

Options:

A.

The plan is based on risk assessment results.

B.

The response team is trained on the plan

C.

The plan is based on industry best practice.

D.

The incident response plan aligns with the IT disaster recovery plan (DRP).

Buy Now
Questions 249

Which of the following should be the PRIMARY objective when establishing a new information security program?

Options:

A.

Executing the security strategy

B.

Minimizing organizational risk

C.

Optimizing resources

D.

Facilitating operational security

Buy Now
Questions 250

An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?

Options:

A.

Determine which country's information security regulations will be used.

B.

Merge the two existing information security programs.

C.

Apply the existing information security program to the acquired company.

D.

Evaluate the information security laws that apply to the acquired company.

Buy Now
Questions 251

An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?

Options:

A.

Benchmark the processes with best practice to identify gaps.

B.

Calculate the return on investment (ROI).

C.

Provide security awareness training to HR.

D.

Assess the business objectives of the processes.

Buy Now
Questions 252

What type of control is being implemented when a security information and event management (SIEM) system is installed?

Options:

A.

Preventive

B.

Deterrent

C.

Detective

D.

Corrective

Buy Now
Questions 253

Which of the following sources is MOST useful when planning a business-aligned information security program?

Options:

A.

Security risk register

B.

Information security policy

C.

Business impact analysis (BIA)

D.

Enterprise architecture (EA)

Buy Now
Questions 254

The contribution of recovery point objective (RPO) to disaster recovery is to:

Options:

A.

minimize outage periods.

B.

eliminate single points of failure.

C.

define backup strategy

D.

reduce mean time between failures (MTBF).

Buy Now
Questions 255

An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?

Options:

A.

Implement the application and request the cloud service provider to fix the vulnerability.

B.

Assess whether the vulnerability is within the organization's risk tolerance levels.

C.

Commission further penetration tests to validate initial test results,

D.

Postpone the implementation until the vulnerability has been fixed.

Buy Now
Questions 256

Which of the following is PRIMARILY determined by asset classification?

Options:

A.

Insurance coverage required for assets

B.

Level of protection required for assets

C.

Priority for asset replacement

D.

Replacement cost of assets

Buy Now
Questions 257

Which of the following is the MOST effective way to convey information security responsibilities across an organization?

Options:

A.

Implementing security awareness programs

B.

Documenting information security responsibilities within job descriptions

C.

Developing a skills matrix

D.

Defining information security responsibilities in the security policy

Buy Now
Questions 258

An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:

Options:

A.

the security organization structure.

B.

international security standards.

C.

risk assessment results.

D.

the most stringent requirements.

Buy Now
Questions 259

To support effective risk decision making, which of the following is MOST important to have in place?

Options:

A.

Established risk domains

B.

Risk reporting procedures

C.

An audit committee consisting of mid-level management

D.

Well-defined and approved controls

Buy Now
Questions 260

Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?

Options:

A.

Regulatory requirements

B.

Compliance acceptance

C.

Management support

D.

Budgetary approval

Buy Now
Questions 261

The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?

Options:

A.

Inform senior management

B.

Re-evaluate the risk

C.

Implement compensating controls

D.

Ask the business owner for the new remediation plan

Buy Now
Questions 262

An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:

Options:

A.

service level agreements (SLAs)

B.

security requirements for the process being outsourced.

C.

risk-reporting methodologies.

D.

security metrics

Buy Now
Questions 263

Which of the following is the GREATEST benefit of performing a tabletop exercise of the business continuity plan (BCP)?

Options:

A.

It identifies appropriate follow-up work to address shortcomings in the plan.

B.

It allows for greater participation and planning from the business side.

C.

It helps in assessing the availability of compatible backup hardware.

D.

It provides a low-cost method of assessing the BCP's completeness.

Buy Now
Questions 264

When establishing an information security governance framework, it is MOST important for an information security manager to understand:

Options:

A.

information security best practices.

B.

risk management techniques.

C.

the threat environment.

D.

the corporate culture.

Buy Now
Questions 265

When assigning a risk owner, the MOST important consideration is to ensure the owner has:

Options:

A.

adequate knowledge of risk treatment and related control activities.

B.

decision-making authority and the ability to allocate resources for risk.

C.

sufficient time for monitoring and managing the risk effectively.

D.

risk communication and reporting skills to enable decision-making.

Buy Now
Questions 266

Which of the following is MOST important to consider when defining control objectives?

Options:

A.

Industry best practices

B.

An information security framework

C.

Control recommendations from a recent audit

D.

The organization's risk appetite

Buy Now
Questions 267

Which of the following is the BEST indication of an effective information security awareness training program?

Options:

A.

An increase in the frequency of phishing tests

B.

An increase in positive user feedback

C.

An increase in the speed of incident resolution

D.

An increase in the identification rate during phishing simulations

Buy Now
Questions 268

Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?

Options:

A.

Risk assessment program

B.

Information security awareness training

C.

Information security governance

D.

Information security metrics

Buy Now
Questions 269

The effectiveness of an information security governance framework will BEST be enhanced if:

Options:

A.

consultants review the information security governance framework.

B.

a culture of legal and regulatory compliance is promoted by management.

C.

risk management is built into operational and strategic activities.

D.

IS auditors are empowered to evaluate governance activities

Buy Now
Questions 270

Which of the following metrics would provide an accurate measure of an information security program's performance?

Options:

A.

A collection of qualitative indicators that accurately measure security exceptions

B.

A combination of qualitative and quantitative trends that enable decision making

C.

A collection of quantitative indicators that are compared against industry benchmarks

D.

A single numeric score derived from various measures assigned to the security program

Buy Now
Questions 271

When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:

Options:

A.

consider the organizations business strategy.

B.

consider the strategic objectives of the program.

C.

leverage industry benchmarks.

D.

identify the program's risk and compensating controls.

Buy Now
Questions 272

Which of the following should have the MOST influence on an organization's response to a new industry regulation?

Options:

A.

The organization's control objectives

B.

The organization's risk management framework

C.

The organization's risk appetite

D.

The organization's risk control baselines

Buy Now
Questions 273

Which of the following BEST illustrates residual risk within an organization?

Options:

A.

Heat map

B.

Risk management framework

C.

Business impact analysis (BIA)

D.

Balanced scorecard

Buy Now
Questions 274

Which of the following is the BEST control to protect customer personal information that is stored in the cloud?

Options:

A.

Timely deletion of digital records

B.

Appropriate data anonymization

C.

Strong encryption methods

D.

Strong physical access controls

Buy Now
Questions 275

Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?

Options:

A.

Increase the frequency of system backups.

B.

Review the mitigating security controls.

C.

Notify staff members of the threat.

D.

Assess the risk to the organization.

Buy Now
Questions 276

Which of the following is established during the preparation phase of an incident response plan?

Options:

A.

Recovery time objectives (RTOs)

B.

Chain of custody procedures

C.

Stakeholder communication plan

D.

Mean time to respond (MTTR)

Buy Now
Questions 277

ACISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider's data center. Which of the following should the CISO do FIRST?

Options:

A.

Recommend canceling the outsourcing contract.

B.

Request an independent review of the provider's data center.

C.

Notify affected customers of the data breach.

D.

Determine the extent of the impact to the organization.

Buy Now
Questions 278

Reverse lookups can be used to prevent successful:

Options:

A.

denial of service (DoS) attacks

B.

session hacking

C.

phishing attacks

D.

Internet protocol (IP) spoofing

Buy Now
Questions 279

An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?

Options:

A.

Establish an organization-wide social media policy.

B.

Develop sanctions for misuse of social media sites.

C.

Monitor social media sites visited by employees.

D.

Restrict social media access on corporate devices.

Buy Now
Questions 280

An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?

Options:

A.

Review independent security assessment reports for each vendor.

B.

Benchmark each vendor's services with industry best practices.

C.

Analyze the risks and propose mitigating controls.

D.

Define information security requirements and processes.

Buy Now
Questions 281

Which of the following is the MOST effective defense against malicious insiders compromising confidential information?

Options:

A.

Regular audits of access controls

B.

Strong background checks when hiring staff

C.

Prompt termination procedures

D.

Role-based access control (RBAC)

Buy Now
Questions 282

What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?

Options:

A.

Report the noncompliance to senior management.

B.

Assess the risk of noncompliance.

C.

Activate the incident response plan.

D.

Evaluate possible compensating controls.

Buy Now
Questions 283

When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:

Options:

A.

expected duration of outage.

B.

management direction.

C.

type of security incident.

D.

the root cause of the event.

Buy Now
Questions 284

A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?

Options:

A.

Provide end-user training.

B.

Escalate to senior management.

C.

Continue to enforce the policy.

D.

Conduct a business impact analysis (BIA).

Buy Now
Questions 285

Which of the following is the MOST important reason to document information security incidents that are reported across the organization?

Options:

A.

Evaluate the security posture of the organization.

B.

Identify unmitigated risk.

C.

Prevent incident recurrence.

D.

Support business investments in security.

Buy Now
Questions 286

Which of the following is MOST important to consider when determining asset valuation?

Options:

A.

Asset recovery cost

B.

Asset classification level

C.

Cost of insurance premiums

D.

Potential business loss

Buy Now
Questions 287

Relationships between critical systems are BEST understood by

Options:

A.

evaluating key performance indicators (KPIs)

B.

performing a business impact analysis (BIA)

C.

developing a system classification scheme

D.

evaluating the recovery time objectives (RTOs)

Buy Now
Questions 288

Which of the following is MOST helpful for determining which information security policies should be implemented by an organization?

Options:

A.

Risk assessment

B.

Business impact analysis (BIA)

C.

Vulnerability assessment

D.

Industry best practices

Buy Now
Questions 289

Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?

Options:

A.

Removable storage media

B.

Disaster recovery plan (DRP)

C.

Offsite data backups

D.

Encrypted data drives

Buy Now
Questions 290

To effectively manage an organization's information security risk, it is MOST important to:

Options:

A.

assign risk management responsibility to an experienced consultant.

B.

periodically identify and correct new systems vulnerabilities.

C.

establish and communicate risk tolerance.

D.

benchmark risk scenarios against peer organizations.

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Sep 26, 2025
Questions: 967

PDF + Testing Engine

$87.15  $249

Testing Engine

$78.75  $225
buy now CISM testing engine

PDF (Q&A)

$69.65  $199
buy now CISM pdf