Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Isaca > Isaca Certification > CISM

CISM Certified Information Security Manager Question and Answers

Question # 4

An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:

A.

perform a gap analysis.

B.

implement both companies' policies separately

C.

merge both companies' policies

D.

perform a vulnerability assessment

Full Access
Question # 5

Which of the following BEST supports information security management in the event of organizational changes in security personnel?

A.

Formalizing a security strategy and program

B.

Developing an awareness program for staff

C.

Ensuring current documentation of security processes

D.

Establishing processes within the security operations team

Full Access
Question # 6

Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?

A.

Block IP addresses used by the attacker

B.

Redirect the attacker's traffic

C.

Disable firewall ports exploited by the attacker.

D.

Power off affected servers

Full Access
Question # 7

An organization has determined that fixing a security vulnerability in a critical application is too costly to be feasible, but the impact is material to the business. Which of the following is the MOST appropriate risk treatment?

A.

Purchase cybersecurity insurance.

B.

Accept the risk associated with continued use of the application.

C.

Implement compensating controls for the application.

D.

Discontinue using the application.

Full Access
Question # 8

An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?

A.

Review independent security assessment reports for each vendor.

B.

Benchmark each vendor's services with industry best practices.

C.

Analyze the risks and propose mitigating controls.

D.

Define information security requirements and processes.

Full Access
Question # 9

Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?

A.

Containment

B.

Recovery

C.

Eradication

D.

Identification

Full Access
Question # 10

Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?

A.

Perform a patch update.

B.

Conduct a risk assessment.

C.

Perform a penetration test.

D.

Conduct an impact assessment.

Full Access
Question # 11

Which of the following is the MOST common cause of cybersecurity breaches?

A.

Lack of adequate password rotation

B.

Human error

C.

Abuse of privileged accounts

D.

Lack of control baselines

Full Access
Question # 12

Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?

A.

Define policies and standards for data processing.

B.

Implement applicable privacy principles

C.

Assess local or regional regulations

D.

Research cyber insurance policies

Full Access
Question # 13

Which of the following is the PRIMARY reason to use a phased incident recovery approach?

A.

To gain management buy-in

B.

To give the response team time to analyze incidents

C.

To ensure critical systems are recovered first

D.

To prioritize remediation steps

Full Access
Question # 14

Which of the following is the PRIMARY objective of a cyber resilience strategy?

A.

Business continuity

B.

Regulatory compliance

C.

Employee awareness

D.

Executive support

Full Access
Question # 15

An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?

A.

Requirement for regular information security awareness

B.

Right-to-audit clause

C.

Service level agreement (SLA)

D.

Requirement to comply with corporate security policy

Full Access
Question # 16

Which of the following BEST indicates misalignment of security policies with business objectives?

A.

Low completion rate of employee awareness training

B.

Lack of adequate funding for the security program

C.

A large number of long-term policy exceptions

D.

A large number of user noncompliance incidents

Full Access
Question # 17

When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:

A.

ensure alignment with industry encryption standards.

B.

ensure that systems that handle credit card data are segmented.

C.

review industry best practices for handling secure payments.

D.

review corporate policies regarding credit card information.

Full Access
Question # 18

When integrating security risk management into an organization it is MOST important to ensure:

A.

business units approve the risk management methodology.

B.

the risk treatment process is defined.

C.

information security policies are documented and understood.

D.

the risk management methodology follows an established framework.

Full Access
Question # 19

Which of the following is the MOST important detail to capture in an organization's risk register?

A.

Risk appetite

B.

Risk severity level

C.

Risk acceptance criteria

D.

Risk ownership

Full Access
Question # 20

Which of the following will BEST facilitate integrating the information security program into corporate governance?

A.

An up-to-date security strategy

B.

Documentation of the threat landscape

C.

Documentation of residual risk

D.

A minimum security baseline

Full Access
Question # 21

An organization plans to offer clients a new service that is subject to regulations. What should the organization do FIRST when developing a security strategy in support of this new service?

A.

Determine security controls for the new service.

B.

Establish a compliance program,

C.

Perform a gap analysis against the current state

D.

Hire new resources to support the service.

Full Access
Question # 22

Which of the following is the MOST important reason for logging firewall activity?

A.

Metrics reporting

B.

Firewall tuning

C.

Intrusion prevention

D.

Incident investigation

Full Access
Question # 23

Which of the following BEST facilitates effective strategic alignment of security initiatives?

A.

The business strategy is periodically updated

B.

Procedures and standards are approved by department heads.

C.

Periodic security audits are conducted by a third-party.

D.

Organizational units contribute to and agree on priorities

Full Access
Question # 24

Which of the following BEST indicates that information assets are classified accurately?

A.

Appropriate prioritization of information risk treatment

B.

Increased compliance with information security policy

C.

Appropriate assignment of information asset owners

D.

An accurate and complete information asset catalog

Full Access
Question # 25

Of the following, whose input is of GREATEST importance in the development of an information security strategy?

A.

Process owners

B.

End users

C.

Security architects.

D.

Corporate auditors

Full Access
Question # 26

Which of the following should have the MOST influence on an organization's response to a new industry regulation?

A.

The organization's control objectives

B.

The organization's risk management framework

C.

The organization's risk appetite

D.

The organization's risk control baselines

Full Access
Question # 27

Which of the following is MOST important to consider when aligning a security awareness program with the organization's business strategy?

A.

Regulations and standards

B.

People and culture

C.

Executive and board directives

D.

Processes and technology

Full Access
Question # 28

Which type of recovery site is MOST reliable and can support stringent recovery requirements?

A.

Cold site

B.

Warm site

C.

Hot site

D.

Mobile site

Full Access
Question # 29

When analyzing the emerging risk and threat landscape, an information security manager should FIRST:

A.

determine the impact if threats materialize.

B.

determine the sources of emerging threats.

C.

review historical threats within the industry.

D.

map threats to business assets.

Full Access
Question # 30

Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?

A.

Follow the escalation process.

B.

Identify the indicators of compromise.

C.

Notify law enforcement.

D.

Contact forensic investigators.

Full Access
Question # 31

A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?

A.

Information security manager

B.

Security policy author

C.

Creator of the document

D.

Data custodian

Full Access
Question # 32

Which of the following tasks should be performed once a disaster recovery plan (DRP) has been developed?

A.

Develop the test plan.

B.

Analyze the business impact.

C.

Define response team roles.

D.

Identify recovery time objectives (RTOs).

Full Access
Question # 33

Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?

A.

Right-to-audit clause

B.

The third party's incident response plan

C.

Service level agreement (SLA)

D.

The third party's business continuity plan (BCP)

Full Access
Question # 34

The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:

A.

results of exit interviews.

B.

previous training sessions.

C.

examples of help desk requests.

D.

responses to security questionnaires.

Full Access
Question # 35

Which of the following processes BEST supports the evaluation of incident response effectiveness?

A.

Root cause analysis

B.

Post-incident review

C.

Chain of custody

D.

Incident logging

Full Access
Question # 36

Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?

A.

Inform the public relations officer.

B.

Monitor the third party's response.

C.

Invoke the incident response plan.

D.

Inform customers of the breach.

Full Access
Question # 37

An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?

A.

Identify users associated with the exposed data.

B.

Initiate the organization's data loss prevention (DLP) processes.

C.

Review the cloud provider's service level agreement (SLA).

D.

Invoke the incident response plan.

Full Access
Question # 38

Which of the following is MOST important to the successful implementation of an information security program?

A.

Adequate security resources are allocated to the program.

B.

Key performance indicators (KPIs) are defined.

C.

A balanced scorecard is approved by the steering committee.

D.

The program is developed using global security standards.

Full Access
Question # 39

Which of the following will result in the MOST accurate controls assessment?

A.

Mature change management processes

B.

Senior management support

C.

Well-defined security policies

D.

Unannounced testing

Full Access
Question # 40

Which of the following BEST enables an information security manager to demonstrate the effectiveness of the information security and risk program to senior management?

A.

Updated risk assessments

B.

Counts of information security incidents

C.

Audit reports

D.

Monthly metrics

Full Access
Question # 41

Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?

A.

Host patching

B.

Penetration testing

C.

Infrastructure hardening

D.

Data classification

Full Access
Question # 42

Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?

A.

Incorporate policy statements derived from third-party standards and benchmarks.

B.

Adhere to a unique corporate privacy and security standard

C.

Establish baseline standards for all locations and add supplemental standards as required

D.

Require that all locations comply with a generally accepted set of industry

Full Access
Question # 43

Which of the following is the MOST important consideration when determining which type of failover site to employ?

A.

Reciprocal agreements

B.

Disaster recovery test results

C.

Recovery time objectives (RTOs)

D.

Data retention requirements

Full Access
Question # 44

An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''

A.

Deploy mobile device management (MDM)

B.

Implement remote wipe capability.

C.

Create an acceptable use policy.

D.

Conduct a mobile device risk assessment

Full Access
Question # 45

Which of the following is MOST effective for communicating forward-looking trends within security reporting?

A.

Key control indicator (KCIs)

B.

Key risk indicators (KRIs)

C.

Key performance indicators (KPIs)

D.

Key goal indicators (KGIs)

Full Access
Question # 46

An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:

• A bad actor broke into a business-critical FTP server by brute forcing an administrative password

• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored

• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server

• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail

Which of the following could have been prevented by conducting regular incident response testing?

A.

Ignored alert messages

B.

The server being compromised

C.

The brute force attack

D.

Stolen data

Full Access
Question # 47

Which of the following is MOST important for the effective implementation of an information security governance program?

A.

Employees receive customized information security training

B.

The program budget is approved and monitored by senior management

C.

The program goals are communicated and understood by the organization.

D.

Information security roles and responsibilities are documented.

Full Access
Question # 48

A balanced scorecard MOST effectively enables information security:

A.

risk management

B.

project management

C.

governance

D.

performance

Full Access
Question # 49

Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?

A.

Verify that information security requirements are included in the contract.

B.

Request customer references from the vendor.

C.

Require vendors to complete information security questionnaires.

D.

Review the results of the vendor's independent control reports.

Full Access
Question # 50

Which of the following is MOST important when responding to a major security incident?

A.

Contacting forensic investigators

B.

Following the escalation process

C.

Notifying law enforcement

D.

Identifying the indicators of compromise

Full Access
Question # 51

Recovery time objectives (RTOs) are BEST determined by:

A.

business managers

B.

business continuity officers

C.

executive management

D.

database administrators (DBAs).

Full Access
Question # 52

Which of the following is the BEST way to obtain organization-wide support for an information security program?

A.

Mandate regular security awareness training.

B.

Develop security performance metrics.

C.

Position security as a business enabler.

D.

Prioritize security initiatives based on IT strategy.

Full Access
Question # 53

Which of the following is the BEST approach to make strategic information security decisions?

A.

Establish regular information security status reporting.

B.

Establish an information security steering committee.

C.

Establish business unit security working groups.

D.

Establish periodic senior management meetings.

Full Access
Question # 54

The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:

A.

cause fewer potential production issues.

B.

require less IT staff preparation.

C.

simulate real-world attacks.

D.

identify more threats.

Full Access
Question # 55

To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?

A.

Data storage procedures

B.

Data classification policy

C.

Results of penetration testing

D.

Features of data protection products

Full Access
Question # 56

Which of the following activities is MOST appropriate to conduct during the eradication phase of a cyber incident response?

A.

Restore affected systems for normal operations.

B.

Mitigate exploited vulnerabilities to stop future incidents.

C.

Estimate the amount of damage caused by the incident.

D.

Isolate affected systems to prevent further damage

Full Access
Question # 57

What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?

A.

Perform a vulnerability assessment on the systems within the department.

B.

Introduce additional controls to force compliance with policy.

C.

Require department users to repeat security awareness training.

D.

Report the policy violation to senior management.

Full Access
Question # 58

Which of the following is the BEST way to determine the effectiveness of an incident response plan?

A.

Reviewing previous audit reports

B.

Conducting a tabletop exercise

C.

Benchmarking the plan against best practices

D.

Performing a penetration test

Full Access
Question # 59

Which of the following is the FIRST step in developing a business continuity plan (BCP)?

A.

Determine the business recovery strategy

B.

Determine available resources.

C.

Identify the applications with the shortest recovery time objectives (RTOs).

D.

Identify critical business processes.

Full Access
Question # 60

The MOST important information for influencing management’s support of information security is:

A.

an demonstration of alignment with the business strategy.

B.

An identification of the overall threat landscape.

C.

A report of a successful attack on a competitor.

D.

An identification of organizational risks.

Full Access
Question # 61

An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:

A.

determine the security exposures.

B.

assess the ability to integrate the security department operations.

C.

ensure compliance with international standards.

D.

evaluate the security policy and standards.

Full Access
Question # 62

What is the PRIMARY objective of performing a vulnerability assessment following a business system update?

A.

Determine operational losses.

B.

Improve the change control process.

C.

Update the threat landscape.

D.

Review the effectiveness of controls

Full Access
Question # 63

Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?

A.

Suspend the data exchange with the provider

B.

Notify appropriate regulatory authorities of the breach.

C.

Initiate the business continuity plan (BCP)

D.

Validate the breach with the provider

Full Access
Question # 64

Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:

A.

a function of the likelihood and impact, should a threat exploit a vulnerability.

B.

the magnitude of the impact, should a threat exploit a vulnerability.

C.

a function of the cost and effectiveness of controls over a vulnerability.

D.

the likelihood of a given threat attempting to exploit a vulnerability

Full Access
Question # 65

When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?

A.

Business impact analysis (BIA) results

B.

Vulnerability assessment results

C.

The business continuity plan (BCP)

D.

Recommendations from senior management

Full Access
Question # 66

Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?

A.

Obtain consensus on the strategy from the executive board.

B.

Review alignment with business goals.

C.

Define organizational risk tolerance.

D.

Develop a project plan to implement the strategy.

Full Access
Question # 67

In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:

A.

evaluate results of the most recent incident response test.

B.

review the number of reported security incidents.

C.

ensure established security metrics are reported.

D.

assess progress of risk mitigation efforts.

Full Access
Question # 68

Which of the following is MOST important to ensure the alignment of an information security program with the organizational strategy?

A.

Benchmarking against industry peers

B.

Adoption of an industry recognized framework

C.

Approval from senior management

D.

Identification of business-specific risk factors

Full Access
Question # 69

An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?

A.

Block network access until security awareness training is complete.

B.

Conduct an enterprise cybersecurity risk assessment.

C.

Obtain key stakeholder and leadership support.

D.

Send an email mandating training for the employees.

Full Access
Question # 70

Which of the following is MOST important to convey to employees in building a security risk-aware culture?

A.

Personal information requires different security controls than sensitive information.

B.

Employee access should be based on the principle of least privilege.

C.

Understanding an information asset's value is critical to risk management.

D.

The responsibility for security rests with all employees.

Full Access
Question # 71

Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?

A.

Focus on addressing conflicts between security and performance.

B.

Collaborate with business and IT functions in determining controls.

C.

Include information security requirements in the change control process.

D.

Obtain assistance from IT to implement automated security cantrals.

Full Access
Question # 72

An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?

A.

Allow the practice to continue temporarily for monitoring purposes.

B.

Disable the employees' remote access to company email and data

C.

Initiate remote wipe of the devices

D.

Assess the business need to provide a secure solution

Full Access
Question # 73

Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?

A.

Heightened awareness of information security strategies

B.

Improved process resiliency in the event of attacks

C.

Promotion of security-by-design principles to the business

D.

Management accountability for information security

Full Access
Question # 74

Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?

A.

Risk assessment program

B.

Information security awareness training

C.

Information security governance

D.

Information security metrics

Full Access
Question # 75

Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?

A.

Consult with IT staff and assess the risk based on their recommendations

B.

Update the security policy based on the regulatory requirements

C.

Propose relevant controls to ensure the business complies with the regulation

D.

Identify and assess the risk in the context of business objectives

Full Access
Question # 76

Which of the following would BEST enable the timely execution of an incident response plan?

A.

The introduction of a decision support tool

B.

Definition of trigger events

C.

Clearly defined data classification process

D.

Centralized service desk

Full Access
Question # 77

The categorization of incidents is MOST important for evaluating which of the following?

A.

Appropriate communication channels

B.

Allocation of needed resources

C.

Risk severity and incident priority

D.

Response and containment requirements

Full Access
Question # 78

Which of the following should have the MOST influence on the development of information security policies?

A.

Business strategy

B.

Past and current threats

C.

IT security framework

D.

Industry standards

Full Access
Question # 79

What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?

A.

Report the noncompliance to senior management.

B.

Assess the risk of noncompliance.

C.

Activate the incident response plan.

D.

Evaluate possible compensating controls.

Full Access
Question # 80

An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?

A.

File integrity monitoring software

B.

Security information and event management (SIEM) tool

C.

Antivirus software

D.

Intrusion detection system (IDS)

Full Access
Question # 81

Which of the following is the PRIMARY advantage of an organization using Disaster Recovery as a Service (DRaaS) to help manage its disaster recovery program?

A.

It offers the organization flexible deployment options using cloud infrastructure.

B.

It allows the organization to prioritize its core operations.

C.

It is more secure than traditional data backup architecture.

D.

It allows the use of a professional response team at a lower cost.

Full Access
Question # 82

Which of the following is the PRIMARY responsibility of the information security function when an organization adopts emerging technologies?

A.

Developing security training for the new technologies

B.

Designing new security controls

C.

Creating an acceptable use policy for the technologies

D.

Assessing the potential security risk

Full Access
Question # 83

While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?

A.

The test is scheduled to reduce operational impact.

B.

The test involves IT members in the test process.

C.

The test addresses the critical components.

D.

The test simulates actual prime-time processing conditions.

Full Access
Question # 84

Which of the following BEST supports the incident management process for attacks on an organization's supply chain?

A.

Including service level agreements (SLAs) in vendor contracts

B.

Establishing communication paths with vendors

C.

Requiring security awareness training for vendor staff

D.

Performing integration testing with vendor systems

Full Access
Question # 85

Which of the following is MOST important in increasing the effectiveness of incident responders?

A.

Communicating with the management team

B.

Integrating staff with the IT department

C.

Testing response scenarios

D.

Reviewing the incident response plan annually

Full Access
Question # 86

Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:

A.

number of impacted users.

B.

capability of incident handlers.

C.

type of confirmed incident.

D.

predicted incident duration.

Full Access
Question # 87

Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?

A.

Establish key risk indicators (KRIs).

B.

Use quantitative risk assessment methods.

C.

Provide regular reporting on risk treatment to senior management

D.

Require steering committee approval of risk treatment plans.

Full Access
Question # 88

Which of the following should be the PRIMARY outcome of an information security program?

A.

Strategic alignment

B.

Risk elimination

C.

Cost reduction

D.

Threat reduction

Full Access
Question # 89

An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?

A.

Conduct an information security audit.

B.

Validate the relevance of the information.

C.

Perform a gap analysis.

D.

Inform senior management

Full Access
Question # 90

Which of the following would BEST support the business case for an increase in the information security budget?

A.

Cost-benefit analysis results

B.

Comparison of information security budgets with peer organizations

C.

Business impact analysis (BIA) results

D.

Frequency of information security incidents

Full Access
Question # 91

Which of the following is the MOST important outcome of effective risk treatment?

A.

Elimination of risk

B.

Timely reporting of incidents

C.

Reduced cost of acquiring controls

D.

Implementation of corrective actions

Full Access
Question # 92

A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?

A.

Ability to test the patch prior to deployment

B.

Documentation of patching procedures

C.

Adequacy of the incident response plan

D.

Availability of resources to implement controls

Full Access
Question # 93

Which of the following is the MOST important consideration when establishing an organization's information security governance committee?

A.

Members have knowledge of information security controls.

B.

Members are business risk owners.

C.

Members are rotated periodically.

D.

Members represent functions across the organization.

Full Access
Question # 94

What should be an information security manager's MOST important consideration when developing a multi-year plan?

A.

Ensuring contingency plans are in place for potential information security risks

B.

Ensuring alignment with the plans of other business units

C.

Allowing the information security program to expand its capabilities

D.

Demonstrating projected budget increases year after year

Full Access
Question # 95

Which of the following is the BEST method to ensure compliance with password standards?

A.

Implementing password-synchronization software

B.

Using password-cracking software

C.

Automated enforcement of password syntax rules

D.

A user-awareness program

Full Access
Question # 96

Which of the following is MOST important for the successful implementation of an incident response plan?

A.

Ensuring response staff are appropriately trained

B.

Developing metrics for incident response reporting

C.

Establishing an escalation process for the help desk

D.

Developing a RACI chart of response staff functions

Full Access
Question # 97

Which of the following sources is MOST useful when planning a business-aligned information security program?

A.

Security risk register

B.

Information security policy

C.

Business impact analysis (BIA)

D.

Enterprise architecture (EA)

Full Access
Question # 98

During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?

A.

Install patches on all existing systems.

B.

Review the vulnerability management process.

C.

Report the root cause of the vulnerability to senior management.

D.

Scan to determine whether the vulnerability is present on other systems.

Full Access
Question # 99

Senior management has expressed concern that the organization's intrusion prevention system (IPS) may repeatedly disrupt business operations Which of the following BEST indicates that the information security manager has tuned the system to address this concern?

A.

Increasing false negatives

B.

Decreasing false negatives

C.

Decreasing false positives

D.

Increasing false positives

Full Access
Question # 100

Which of the following BEST ensures timely and reliable access to services?

A.

Nonrepudiation

B.

Authenticity

C.

Availability

D.

Recovery time objective (RTO)

Full Access
Question # 101

Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?

A.

To alert on unacceptable risk

B.

To identify residual risk

C.

To reassess risk appetite

D.

To benchmark control performance

Full Access
Question # 102

An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?

A.

Prepare compensating controls

B.

Perform a vulnerability assessment

C.

Conduct an internal audit

D.

Conduct penetration testing

Full Access
Question # 103

Which type of backup BEST enables an organization to recover data after a ransomware attack?

A.

Online backup

B.

Incremental backup

C.

Differential backup

D.

Offline backup

Full Access
Question # 104

Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?

A.

Removable storage media

B.

Disaster recovery plan (DRP)

C.

Offsite data backups

D.

Encrypted data drives

Full Access
Question # 105

Which of the following BEST demonstrates that an anti-phishing campaign is effective?

A.

Improved staff attendance in awareness sessions

B.

Decreased number of phishing emails received

C.

Improved feedback on the anti-phishing campaign

D.

Decreased number of incidents that have occurred

Full Access
Question # 106

Reverse lookups can be used to prevent successful:

A.

denial of service (DoS) attacks

B.

session hacking

C.

phishing attacks

D.

Internet protocol (IP) spoofing

Full Access
Question # 107

An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?

A.

Identification of risk

B.

Analysis of control gaps

C.

Design of key risk indicators (KRIs)

D.

Selection of risk treatment options

Full Access
Question # 108

Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?

A.

Create a security exception.

B.

Perform a gap analysis to determine needed resources.

C.

Perform a vulnerability assessment.

D.

Assess the risk to business operations.

Full Access
Question # 109

Which of the following is MOST important to consider when determining asset valuation?

A.

Asset recovery cost

B.

Asset classification level

C.

Cost of insurance premiums

D.

Potential business loss

Full Access
Question # 110

Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?

A.

Revise the procurement process.

B.

Update the change management process.

C.

Discuss the issue with senior leadership.

D.

Remove the application from production.

Full Access
Question # 111

Which of the following is the PRIMARY impact of organizational culture on the effectiveness of an information security program?

A.

The culture shapes behaviors toward information security.

B.

The culture defines responsibilities necessary for program implementation.

C.

The culture helps determine budget for information security controls.

D.

The culture has minimal impact as long as information security controls are adhered to.

Full Access
Question # 112

Senior management is concerned about data exposure through the use of public Al services. Which of the following is the information security manager's BEST course of action?

A.

Train all employees on the appropriate use of public Al services and confidential data.

B.

Disable access to public Al from company devices.

C.

Perform a risk assessment of public Al with appropriate recommendations for senior management.

D.

Perform a business impact analysis (BIA) of public Al.

Full Access
Question # 113

Which of the following is the responsibility of a risk owner?

A.

Implementing risk treatment plan activities with control owners

B.

Evaluating control effectiveness

C.

Approving risk treatment plans

D.

Approving the selection of risk mitigation measures

Full Access
Question # 114

Which of the following messages would be MOST effective in obtaining senior management's commitment to information security management?

A.

Effective security eliminates risk to the business.

B.

Adopt a recognized framework with metrics.

C.

Security is a business product and not a process.

D.

Security supports and protects the business.

Full Access
Question # 115

An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?

A.

Focus the review on the infrastructure with the highest risk

B.

Review controls listed in the vendor contract

C.

Determine whether the vendor follows the selected security framework rules

D.

Review the vendor's security policy

Full Access
Question # 116

A global organization has outsourced security processes to a service provider by means of a global agreement. What is the MOST efficient approach to meet country-specific regulatory requirements?

A.

Include binding corporate rules into the global agreement

B.

Review the agreement for each country separately

C.

Set up a governance organization for each country

D.

Set up companion agreements for each country

Full Access
Question # 117

Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?

A.

Communicate disciplinary processes for policy violations.

B.

Require staff to participate in information security awareness training.

C.

Require staff to sign confidentiality agreements.

D.

Include information security responsibilities in job descriptions.

Full Access
Question # 118

An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?

A.

Implement the application and request the cloud service provider to fix the vulnerability.

B.

Assess whether the vulnerability is within the organization's risk tolerance levels.

C.

Commission further penetration tests to validate initial test results,

D.

Postpone the implementation until the vulnerability has been fixed.

Full Access
Question # 119

Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?

A.

It transfers the risk associated with recovery to a third party.

B.

It lowers the annual cost to the business.

C.

It eliminates the need to maintain offsite facilities.

D.

It eliminates the need for the business to perform testing.

Full Access
Question # 120

A global organization is developing an incident response team. The organization wants to keep headquarters informed of all incidents and wants to be able to present a unified response to widely dispersed events. Which of the following BEST supports these objectives?

A.

Virtual incident response team

B.

Distributed incident response team

C.

Outsourced incident response team

D.

Centralized incident response team

Full Access
Question # 121

An organization's quality process can BEST support security management by providing:

A.

security configuration controls.

B.

assurance that security requirements are met.

C.

guidance for security strategy.

D.

a repository for security systems documentation.

Full Access
Question # 122

Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?

A.

To improve awareness of information security

B.

To disclose the root cause of the incident

C.

To increase goodwill toward the organization

D.

To comply with regulations regarding notification

Full Access
Question # 123

Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?

A.

Mail relay server

B.

Proxy server

C.

Database server

D.

Application server

Full Access
Question # 124

When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?

A.

Business impact analysis (BIA) results

B.

Key performance indicators (KPIs)

C.

Recovery procedures

D.

Systems inventory

Full Access
Question # 125

Which of the following would provide the BEST evidence to senior management that security control performance has improved?

A.

Demonstrated return on security investment

B.

Reduction in inherent risk

C.

Results of an emerging threat analysis

D.

Review of security metrics trends

Full Access
Question # 126

Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?

A.

Current resourcing levels

B.

Availability of potential resources

C.

Information security strategy

D.

Information security incidents

Full Access
Question # 127

Which of the following should be the PRIMARY focus for an information security manager when reviewing access controls for data stored in an off-premise cloud environment?

A.

Reviewing and updating access controls in response to changes in organizational structure

B.

Implementing strong password policies and enforcing regular password changes

C.

Ensuring access is granted to only those individuals whose job functions require it

D.

Implementing strong encryption protocols to protect sensitive data

Full Access
Question # 128

Which of the following is MOST important for an information security manager to consider when reviewing a security investment plan?

A.

The plan has summarized IT costs for implementation.

B.

The plan resolves all potential threats to business processes.

C.

The plan focuses on meeting industry best practices and industry standards.

D.

The plan is based on a review of threats and vulnerabilities.

Full Access
Question # 129

Which of the following is the MOST likely reason for a vulnerability scanner to return incomplete results?

A.

Unauthenticated vulnerability scans are being performed.

B.

Scan results are not ingested into a security information and event management (SIEM) tool.

C.

Host names have not been fully enumerated.

D.

Zero-day vulnerability signatures have not been ingested.

Full Access
Question # 130

An organization's HR department requires that employee account privileges be removed from all corporate IT systems within three days of termination to comply with a government regulation However, the systems all have different user directories, and it currently takes up to four weeks to remove the privileges Which of the following would BEST enable regulatory compliance?

A.

Multi-factor authentication (MFA) system

B.

Identity and access management (IAM) system

C.

Privileged access management (PAM) system

D.

Governance, risk, and compliance (GRC) system

Full Access
Question # 131

An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:

A.

disable the user's access to corporate resources.

B.

terminate the device connectivity.

C.

remotely wipe the device

D.

escalate to the user's management

Full Access
Question # 132

A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?

A.

Prevent the user from using personal mobile devices.

B.

Report the incident to the police.

C.

Wipe the device remotely.

D.

Remove user's access to corporate data.

Full Access
Question # 133

Which of the following is the PRIMARY role of an information security manager in a software development project?

A.

To enhance awareness for secure software design

B.

To assess and approve the security application architecture

C.

To identify noncompliance in the early design stage

D.

To identify software security weaknesses

Full Access
Question # 134

Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?

A.

Cost of the attack to the organization

B.

Location of the attacker

C.

Method of operation used by the attacker

D.

Details from intrusion detection system (IDS) logs

Full Access
Question # 135

Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?

A.

Impact on information security program

B.

Cost of controls

C.

Impact to business function

D.

Cost to replace

Full Access
Question # 136

After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:

A.

determine the potential impact.

B.

reevaluate the standards.

C.

implement compensating controls.

D.

evaluate the cost of replacing the applications.

Full Access
Question # 137

A security incident has been reported within an organization When should an information security manager contact the information owner?

A.

After the incident has been mitigated

B.

After the incident has been confirmed.

C.

After the potential incident has been togged

D.

After the incident has been contained

Full Access
Question # 138

Which of the following provides the MOST useful information for identifying security control gaps on an application server?

A.

Risk assessments

B.

Threat models

C.

Penetration testing

D.

Internal audit reports

Full Access
Question # 139

Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?

A.

Include the impact of the risk as part of regular metrics.

B.

Recommend the security steering committee conduct a review.

C.

Update the risk assessment at regular intervals

D.

Send regular notifications directly to senior managers

Full Access
Question # 140

When is the BEST time to verify that a production system's security mechanisms meet control objectives?

A.

During quality and acceptance checks

B.

On a continuous basis through monitoring activities and automated tooling

C.

After remediations recommended by penetration tests have been completed

D.

During annual internal and compliance audits

Full Access
Question # 141

The MOST useful technique for maintaining management support for the information security program is:

A.

informing management about the security of business operations.

B.

implementing a comprehensive security awareness and training program.

C.

identifying the risks and consequences of failure to comply with standards.

D.

benchmarking the security programs of comparable organizations.

Full Access
Question # 142

Which of the following parties should be responsible for determining access levels to an application that processes client information?

A.

The business client

B.

The information security tear

C.

The identity and access management team

D.

Business unit management

Full Access
Question # 143

An organization is performing due diligence when selecting a third party. Which of the following is MOST helpful to reduce the risk of unauthorized sharing of information during this process?

A.

Using secure communication channels

B.

Establishing mutual non-disclosure agreements (NDAs)

C.

Requiring third-party privacy policies

D.

Obtaining industry references

Full Access
Question # 144

A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is

A.

the risk assessment has not defined the likelihood of occurrence

B.

the reported vulnerability has not been validated

C.

executive management is not aware of the impact potential

D.

the cost of implementing controls exceeds the potential financial losses.

Full Access
Question # 145

Prior to implementing a bring your own device (BYOD) program, it is MOST important to:

A.

select mobile device management (MDM) software.

B.

survey employees for requested applications.

C.

develop an acceptable use policy.

D.

review currently utilized applications.

Full Access
Question # 146

What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?

A.

Vendor service level agreements (SLAs)

B.

Independent review of the vendor

C.

Local laws and regulations

D.

Backup and restoration of data

Full Access
Question # 147

Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?

A.

Information security manager

B.

Chief risk officer (CRO)

C.

Information security steering committee

D.

Risk owner

Full Access
Question # 148

Following an employee security awareness training program, what should be the expected outcome?

A.

A decrease in the number of viruses detected in incoming emails

B.

A decrease in reported social engineering attacks

C.

An increase in reported social engineering attempts

D.

An increase in user-reported false positive incidents

Full Access
Question # 149

For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:

A.

consistent security.

B.

comprehensive audits

C.

a security-aware culture

D.

compliance with policy

Full Access
Question # 150

When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?

A.

The information security strategy

B.

Losses due to security incidents

C.

The results of a risk assessment

D.

Security investment trends in the industry

Full Access
Question # 151

A risk owner has accepted a large amount of risk due to the high cost of controls. Which of the following should be the information security manager's PRIMARY focus in this situation?

A.

Establishing a strong ongoing risk monitoring process

B.

Presenting the risk profile for approval by the risk owner

C.

Conducting an independent review of risk responses

D.

Updating the information security standards to include the accepted risk

Full Access
Question # 152

Which of the following should be done FIRST when a SIEM flags a potential event?

A.

Validate the event is not a false positive.

B.

Initiate the incident response plan.

C.

Escalate the event to the business owner.

D.

Implement compensating controls.

Full Access
Question # 153

When determining an acceptable risk level which of the following is the MOST important consideration?

A.

Threat profiles

B.

System criticalities

C.

Vulnerability scores

D.

Risk matrices

Full Access
Question # 154

Application data integrity risk is MOST directly addressed by a design that includes:

A.

reconciliation routines such as checksums, hash totals, and record counts.

B.

strict application of an authorized data dictionary.

C.

application log requirements such as field-level audit trails and user activity logs.

D.

access control technologies such as role-based entitlements.

Full Access
Question # 155

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

A.

Wipe and reset the endpoint device.

B.

Isolate the endpoint device.

C.

Power off the endpoint device.

D.

Run a virus scan on the endpoint device.

Full Access
Question # 156

An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?

A.

Standards

B.

Policies

C.

Guidelines

D.

Procedures

Full Access
Question # 157

Which of the following roles is BEST suited to validate user access requirements during an annual user access review?

A.

Access manager

B.

IT director

C.

System administrator

D.

Business owner

Full Access
Question # 158

In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?

A.

Ownership of security

B.

Compliance with policies

C.

Auditability of systems

D.

Allocation of training resources

Full Access
Question # 159

Which of the following risks is an example of risk transfer?

A.

Utilizing third-party applications

B.

Moving risk ownership to another department

C.

Conducting off-site backups

D.

Purchasing cybersecurity insurance

Full Access
Question # 160

Several months after the installation of a new firewall with intrusion prevention features to block malicious activity, a breach was discovered that came in through the firewall shortly after installation. This breach could have been detected earlier by implementing firewall:

A.

packet filtering.

B.

web surfing controls.

C.

log monitoring.

D.

application awareness.

Full Access
Question # 161

Which of the following will BEST enable an effective information asset classification process?

A.

Including security requirements in the classification process

B.

Analyzing audit findings

C.

Reviewing the recovery time objective (RTO) requirements of the asset

D.

Assigning ownership

Full Access
Question # 162

A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?

A.

Conduct automated scans on applications before deployment.

B.

Supplement existing development teams with security engineers.

C.

Integrate information security into existing change management.

D.

Create a new governance council for application security.

Full Access
Question # 163

Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?

A.

Record and close security incident tickets.

B.

Test and verify that compromisedsystems are clean.

C.

Document recovery steps for senior management reporting.

D.

Capture and preserve forensic images of affected systems.

Full Access
Question # 164

Recommendations for enterprise investment in security technology should be PRIMARILY based on:

A.

adherence to international standards

B.

availability of financial resources

C.

the organization s risk tolerance

D.

alignment with business needs

Full Access
Question # 165

Which of the following should be the PRIMARY goal of information security?

A.

Information management

B.

Regulatory compliance

C.

Data governance

D.

Business alignment

Full Access
Question # 166

Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?

A.

Skills required for the incident response team

B.

A list of external resources to assist with incidents

C.

Service level agreements (SLAs)

D.

A detailed incident notification process

Full Access
Question # 167

Which of the following is the BEST reason to implement a comprehensive information security management system?

To ensure continuous alignment with the organizational strategy

To gain senior management support for the information security program

To support identification of key risk indicators (KRIs)

A.

To facilitate compliance with external regulatory requirements

Full Access
Question # 168

Which of the following BEST indicates that an information security governance framework has been successfully implemented?

A.

The framework aligns internal and external resources.

B.

The framework aligns security processes with industry best practices.

C.

The framework aligns management and other functions within the security organization.

D.

The framework includes commercial off-the-shelf security solutions.

Full Access
Question # 169

Which of the following is the MOST critical factor for information security program success?

A.

comprehensive risk assessment program for information security

B.

The information security manager's knowledge of the business

C.

Security staff with appropriate training and adequate resources

D.

Ongoing audits and addressing open items

Full Access
Question # 170

Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?

A.

Review the key performance indicator (KPI) dashboard

B.

Review security-related key risk indicators (KRIs)

C.

Review control self-assessment (CSA) results

D.

Review periodic security audits

Full Access
Question # 171

Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?

A.

The vendor's proposal allows for contract modification during technology refresh cycles.

B.

The vendor's proposal aligns with the objectives of the organization.

C.

The vendor's proposal requires the provider to have a business continuity plan (BCP).

D.

The vendor's proposal allows for escrow in the event the third party goes out of business.

Full Access
Question # 172

The PRIMARY reason to properly classify information assets is to determine:

A.

appropriate encryption strength using a risk-based approach.

B.

the business impact if assets are compromised.

C.

the appropriate protection based on sensitivity.

D.

user access levels based on the need to know.

Full Access
Question # 173

A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:

A.

analysis of current threat landscape.

B.

historical data of reported incidents.

C.

projected return on investment (ROI).

D.

industry benchmarking gap analysis.

Full Access
Question # 174

A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?

A.

Provide end-user training.

B.

Escalate to senior management.

C.

Continue to enforce the policy.

D.

Conduct a business impact analysis (BIA).

Full Access
Question # 175

A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?

A.

Replace the control

B.

Check for defense in depth

C.

Assess the control state

D.

Report the failure to management

Full Access
Question # 176

An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?

A.

Implementing automated vulnerability scanning in the help desk workflow

B.

Changing the default setting for all security incidents to the highest priority

C.

Integrating automated service level agreement (SLA) reporting into the help desk ticketing system

D.

Integrating incident response workflow into the help desk ticketing system

Full Access
Question # 177

A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?

A.

Mitigate

B.

Accept

C.

Transfer

D.

Avoid

Full Access
Question # 178

Which of the following is MOST important when designing security controls for new cloud-based services?

A.

Evaluating different types of deployment models according to the associated risks

B.

Understanding the business and IT strategy for moving resources to the cloud

C.

Defining an incident response policy to protect data moving between onsite and cloud applications

D.

Performing a business impact analysis (BIA) to gather information needed to develop recovery strategies

Full Access
Question # 179

Which of the following is MOST important to include in security incident escalation procedures?

A.

Key objectives of the security program

B.

Recovery procedures

C.

Notification criteria

D.

Containment procedures

Full Access
Question # 180

Which of the following is the BEST course of action when using a web application that has known vulnerabilities?

A.

Monitor application level logs.

B.

Deploy host-based intrusion detection.

C.

Deploy an application firewall.

D.

Install anti-spyware software.

Full Access
Question # 181

Which of the following is the BEST indicator of an emerging incident?

A.

A weakness identified within an organization's information systems

B.

Customer complaints about lack of website availability

C.

A recent security incident at an industry competitor

D.

Attempted patching of systems resulting in errors

Full Access
Question # 182

Which of the following is the BEST course of action for an information security manager to align security and business goals?

A.

Conducting a business impact analysis (BIA)

B.

Reviewing the business strategy

C.

Defining key performance indicators (KPIs)

D.

Actively engaging with stakeholders

Full Access
Question # 183

Which of the following is the PRIMARY reason to assign a risk owner in an organization?

A.

To remediate residual risk

B.

To define responsibilities

C.

To ensure accountability

D.

To identify emerging risk

Full Access
Question # 184

Which of the following is the PRIMARY objective of a business impact analysis (BIA)?

A.

Determine recovery priorities.

B.

Define the recovery point objective (RPO).

C.

Confirm control effectiveness.

D.

Analyze vulnerabilities.

Full Access
Question # 185

Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?

A.

Perform a vulnerability assessment

B.

Perform a gap analysis to determine needed resources

C.

Create a security exception

D.

Assess the risk to business operations

Full Access
Question # 186

Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P

A.

Report the decision to the compliance officer

B.

Update details within the risk register.

C.

Reassess the organization's risk tolerance.

D.

Assess the impact of the regulation.

Full Access
Question # 187

An organization is in the process of defining policies for employee use of social media. It is MOST important for the information security manager to:

A.

Assign accountability for monitoring social media

B.

Identify security monitoring tools

C.

Evaluate risks to the organization

D.

Develop security awareness training

Full Access
Question # 188

Which of the following will have the GREATEST influence on the successful adoption of an information security governance program?

A.

Security policies

B.

Control effectiveness

C.

Security management processes

D.

Organizational culture

Full Access
Question # 189

The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:

A.

validate the confidentiality during analysis.

B.

reinstate original data when accidental changes occur.

C.

validate the integrity during analysis.

D.

provide backup in case of media failure.

Full Access
Question # 190

What should a global information security manager do FIRST when informed that a new regulation with significant impact will go into effect soon?

A.

Perform a privacy impact assessment (PIA).

B.

Perform a vulnerability assessment.

C.

Perform a gap analysis.

D.

Perform a business impact analysis (BIA).

Full Access
Question # 191

Which of the following is the MOST critical input to developing policies, standards, and procedures to secure information assets?

A.

Vulnerability assessment

B.

Regulatory requirements

C.

Industry best practices

D.

Enterprise goals

Full Access
Question # 192

When building support for an information security program, which of the following elements is MOST important?

A.

Identification of existing vulnerabilities

B.

Information risk assessment

C.

Business impact analysis (BIA)

D.

Threat analysis

Full Access
Question # 193

Which of the following BEST prepares a computer incident response team for a variety of information security scenarios?

A.

Forensics certification

B.

Disaster recovery drills

C.

Tabletop exercises

D.

Penetration tests

Full Access
Question # 194

In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?

A.

Access to the hardware

B.

Data encryption

C.

Non-standard event logs

D.

Compressed customer data

Full Access
Question # 195

Which of the following would be MOST helpful when creating information security policies?

A.

The information security framework

B.

Business impact analysis (BIA)

C.

Information security metrics

D.

Risk assessment results

Full Access
Question # 196

After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?

A.

The service level agreement (SLA) was not met.

B.

The recovery time objective (RTO) was not met.

C.

The root cause was not identified.

D.

Notification to stakeholders was delayed.

Full Access
Question # 197

Which of the following should be the PRIMARY consideration when developing an incident response plan?

A.

The definition of an incident

B.

Compliance with regulations

C.

Management support

D.

Previously reported incidents

Full Access
Question # 198

A new regulatory requirement affecting an organization's information security program is released. Which of the following should be the information security manager's FIRST course of action?

A.

Perform a gap analysis.

B.

Conduct benchmarking.

C.

Notify the legal department.

D.

Determine the disruption to the business.

Full Access
Question # 199

Which of the following BEST enables an organization to effectively manage emerging cyber risk?

A.

Periodic internal and external audits

B.

Clear lines of responsibility

C.

Sufficient cyber budget allocation

D.

Cybersecurity policies

Full Access
Question # 200

Which of the following is established during the preparation phase of an incident response plan?

A.

Recovery time objectives (RTOs)

B.

Chain of custody procedures

C.

Stakeholder communication plan

D.

Mean time to respond (MTTR)

Full Access
Question # 201

Which of the following has the GREATEST influence on the successful integration of information security within the business?

A.

Organizational structure and culture

B.

Risk tolerance and organizational objectives

C.

The desired state of the organization

D.

Information security personnel

Full Access
Question # 202

Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?

A.

The security strategy is promoted.

B.

Fewer security incidents are reported.

C.

Security behavior is improved.

D.

More security incidents are detected.

Full Access
Question # 203

An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?

A.

Store disaster recovery documentation in a public cloud.

B.

Maintain an outsourced contact center in another country.

C.

Require disaster recovery documentation be stored with all key decision makers.

D.

Provide annual disaster recovery training to appropriate staff.

Full Access
Question # 204

Which of the following is the MOST important characteristic of an effective information security metric?

A.

The metric expresses residual risk relative to risk tolerance.

B.

The metric is frequently reported to senior management.

C.

The metric directly maps to an industry risk management framework.

D.

The metric compares the organization's inherent risk against its risk appetite.

Full Access
Question # 205

Which of the following should an information security manager do FIRST upon learning that a competitor has experienced a ransomware attack?

A.

Perform a full data backup.

B.

Conduct ransomware awareness training for all staff.

C.

Update indicators of compromise in the security systems.

D.

Review the current risk assessment.

Full Access
Question # 206

Which of the following would BEST guide the development and maintenance of an information security program?

A.

A business impact assessment

B.

A comprehensive risk register

C.

An established risk assessment process

D.

The organization's risk appetite

Full Access
Question # 207

Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?

A.

Implement a mobile device policy and standard.

B.

Provide employee training on secure mobile device practices.

C.

Implement a mobile device management (MDM) solution.

D.

Require employees to install an effective anti-malware app.

Full Access
Question # 208

Which of the following is the MOST important requirement for a successful security program?

A.

Mapping security processes to baseline security standards

B.

Penetration testing on key systems

C.

Management decision on asset value

D.

Nondisclosure agreements (NDA) with employees

Full Access
Question # 209

Which is MOST important to identify when developing an effective information security strategy?

A.

Security awareness training needs

B.

Potential savings resulting from security governance

C.

Business assets to be secured

D.

Residual risk levels

Full Access
Question # 210

Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?

A.

Mobile application control

B.

Inconsistent device security

C.

Configuration management

D.

End user acceptance

Full Access
Question # 211

In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or

A.

Security budget

B.

Risk register

C.

Risk score

D.

Laws and regulations

Full Access
Question # 212

The PRIMARY consideration when responding to a ransomware attack should be to ensure:

A.

backups are available.

B.

the most recent patches have been applied.

C.

the ransomware attack is contained

D.

the business can operate

Full Access
Question # 213

Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?

A.

Storing the plan at an offsite location

B.

Communicating the plan to all stakeholders

C.

Updating the plan periodically

D.

Conducting a walk-through of the plan

Full Access
Question # 214

An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?

A.

Preventive

B.

Corrective

C.

Detective

D.

Deterrent

Full Access
Question # 215

Which of the following will BEST enable an organization to meet incident response requirements when outsourcing its incident response function?

A.

Including response times in service level agreements (SLAs)

B.

Including a right-to-audit clause in service level agreements (SLAs)

C.

Contracting with a well-known incident response provider

D.

Requiring comprehensive response applications and tools

Full Access
Question # 216

When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:

A.

the integrity of evidence is preserved.

B.

forensic investigation software is loaded on the server.

C.

the incident is reported to senior management.

D.

the server is unplugged from power.

Full Access
Question # 217

Which of the following processes is MOST important for the success of a business continuity plan (BCP)?

A.

Involving all stakeholders in testing and training

B.

Scheduling periodic internal and external audits

C.

Including the board and senior management in plan reviews

D.

Maintaining copies of the plan at the primary and recovery sites

Full Access
Question # 218

If the investigation of an incident is not completed within the time allocated in the incident response plan, which of the following actions should be taken by the incident response team?

A.

Initiate the escalation process.

B.

Continue the investigation.

C.

Invoke the business continuity plan (BCP).

D.

Engage the crisis management team.

Full Access
Question # 219

Which of the following is the BEST indicator of the maturity level of a vendor risk management process?

A.

Average time required to complete the vendor risk management process

B.

Percentage of vendors that have gone through the vendor onboarding process

C.

Percentage of vendors that are regularly reviewed against defined criteria

D.

Number of vendors rejected because of security review results

Full Access
Question # 220

Which of the following is MOST important when developing an information security strategy?

A.

Engage stakeholders.

B.

Assign data ownership.

C.

Determine information types.

D.

Classify information assets.

Full Access
Question # 221

Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?

A.

Update the vendor risk assessment.

B.

Engage legal counsel.

C.

Renegotiate the vendor contract.

D.

Terminate the relationship with the vendor.

Full Access
Question # 222

The MAIN benefit of implementing a data loss prevention (DLP) solution is to:

A.

enhance the organization's antivirus controls.

B.

eliminate the risk of data loss.

C.

complement the organization's detective controls.

D.

reduce the need for a security awareness program.

Full Access
Question # 223

An online bank identifies a successful network attack in progress. The bank should FIRST:

A.

isolate the affected network segment.

B.

report the root cause to the board of directors.

C.

assess whether personally identifiable information (Pll) is compromised.

D.

shut down the entire network.

Full Access
Question # 224

After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?

A.

EradicationB Recovery

B.

Lessons learned review

C.

Incident declaration

Full Access
Question # 225

Communicating which of the following would be MOST helpful to gain senior management support for risk treatment options?

A.

Quantitative loss

B.

Industry benchmarks

C.

Threat analysis

D.

Root cause analysis

Full Access
Question # 226

The information security manager of a multinational organization has been asked to consolidate the information security policies of its regional locations. Which of the following would be of

GREATEST concern?

A.

Varying threat environments

B.

Disparate reporting lines

C.

Conflicting legal requirements

D.

Differences in work culture

Full Access
Question # 227

Which of the following is MOST important to the effectiveness of an information security steering committee?

A.

The committee has strong regulatory knowledge.

B.

The committee is comprised of representatives from senior management.

C.

The committee has cross-organizational representation.

D.

The committee uses a risk management framework.

Full Access
Question # 228

Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?

A.

Management's business goals and objectives

B.

Strategies of other non-regulated companies

C.

Risk assessment results

D.

Industry best practices and control recommendations

Full Access
Question # 229

Which of the following is MOST important to determine following the discovery and eradication of a malware attack?

A.

The malware entry path

B.

The creator of the malware

C.

The type of malware involved

D.

The method of detecting the malware

Full Access
Question # 230

Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?

A.

Business impact analysis (BIA)

B.

Risk register

C.

Penetration testing

D.

Vulnerability assessment

Full Access
Question # 231

Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?

A.

To ensure separation of duties is maintained

B.

To ensure system audit trails are not bypassed

C.

To prevent accountability issues

D.

To prevent unauthorized user access

Full Access
Question # 232

Which of the following BEST enables an organization to operate smoothly with reduced capacities when service has been disrupted?

A.

Crisis management plan

B.

Disaster recovery plan (DRP)

C.

Incident response plan

D.

Business continuity plan (BCP)

Full Access
Question # 233

Which of the following is MOST helpful to identify whether information security policies have been followed?

A.

Preventive controls

B.

Detective controls

C.

Directive controls

D.

Corrective controls

Full Access
Question # 234

Which of the following is the PRIMARY reason to review the firewall logs when an external network-based attack is reported by the intrusion detection system (IDS)?

A.

To validate the incident

B.

To review network configurations

C.

To validate the payload signature

D.

To devise the incident response strategy

Full Access
Question # 235

Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?

A.

Reducing the number of vulnerabilities detected

B.

Ensuring the amount of residual risk is acceptable

C.

Avoiding identified system threats

D.

Complying with regulatory requirements

Full Access
Question # 236

Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?

A.

Publish adopted information security standards.

B.

Perform annual information security compliance reviews.

C.

Implement an information security governance framework.

D.

Define penalties for information security noncompliance.

Full Access
Question # 237

An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?

A.

Red team exercise

B.

Black box penetration test

C.

Disaster recovery exercise

D.

Tabletop exercise

Full Access
Question # 238

An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?

A.

Enforce the policy.

B.

Modify the policy.

C.

Present the risk to senior management.

D.

Create an exception for the deviation.

Full Access
Question # 239

Which of the following should be established FIRST when implementing an information security governance framework?

A.

Security architecture

B.

Security policies

C.

Security incident management team

D.

Security awareness training program

Full Access
Question # 240

Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?

A.

Providing ongoing training to the incident response team

B.

Implementing proactive systems monitoring

C.

Implementing a honeypot environment

D.

Updating information security awareness materials

Full Access
Question # 241

Which of the following components of an information security risk assessment is MOST valuable to senior management?

A.

Threat profile

B.

Residual risk

C.

Return on investment (ROI)

D.

Mitigation actions

Full Access
Question # 242

An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?

A.

Perform a business impact analysis (BIA).

B.

Notify local law enforcement agencies of a breach.

C.

Activate the incident response program.

D.

Validate the risk to the organization.

Full Access
Question # 243

Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?

A.

Mapping risk scenarios according to sensitivity of data

B.

Reviewing mitigating and compensating controls for each risk scenario

C.

Mapping the risk scenarios by likelihood and impact on a chart

D.

Performing a risk assessment on the laaS provider

Full Access
Question # 244

Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?

A.

Force password changes on the SQL database.

B.

Reconfigure the web application firewall to block the attack.

C.

Update the detection patterns on the web application firewall.

D.

Block the IPs from where the attack originates.

Full Access
Question # 245

Which of the following is the FIRST step when conducting a post-incident review?

A.

Identify mitigating controls.

B.

Assess the costs of the incident.

C.

Perform root cause analysis.

D.

Assign responsibility for corrective actions.

Full Access
Question # 246

Which of the following is the MOST important factor of a successful information security program?

A.

The program follows industry best practices.

B.

The program is based on a well-developed strategy.

C.

The program is cost-efficient and within budget,

D.

The program is focused on risk management.

Full Access
Question # 247

An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?

A.

Refer the issue to internal audit for a recommendation.

B.

Re-classify the data and increase the security level to meet business risk.

C.

Instruct the relevant system owners to reclassify the data.

D.

Complete a risk assessment and refer the results to the data owners.

Full Access
Question # 248

An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?

A.

Security requirements are included in the vendor contract

B.

External security audit results are reviewed.

C.

Service level agreements (SLAs) meet operational standards.

D.

Business continuity contingency planning is provided

Full Access
Question # 249

Which of the following is MOST important to the effectiveness of an information security program?

A.

Security metrics

B.

Organizational culture

C.

IT governance

D.

Risk management

Full Access
Question # 250

Which of the following has the MOST influence on the inherent risk of an information asset?

A.

Risk tolerance

B.

Net present value (NPV)

C.

Return on investment (ROI)

D.

Business criticality

Full Access
Question # 251

Which of the following would be MOST useful when determining the business continuity strategy for a large organization's data center?

A.

Stakeholder feedback analysis

B.

Business continuity risk analysis

C.

Incident root cause analysis

D.

Business impact analysis (BIA)

Full Access
Question # 252

During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?

A.

Configuration management

B.

Password management

C.

Change management

D.

Version management

Full Access
Question # 253

Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?

A.

Place the web server in quarantine.

B.

Rebuild the server from the last verified backup.

C.

Shut down the server in an organized manner.

D.

Rebuild the server with relevant patches from the original media.

Full Access
Question # 254

Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?

A.

Maturity of incident response activities

B.

Threat environment

C.

Quantity of impacted assets

D.

Incident impact

Full Access
Question # 255

Which of the following is the BEST indication of an effective information security program?

A.

Risk is treated to an acceptable level.

B.

The number of security incidents reported by staff has increased.

C.

Key risk indicators (KRIs) are established.

D.

Policies are reviewed and approved by senior management.

Full Access
Question # 256

Which of the following should be the FIRST step in developing an information security strategy?

A.

Perform a gap analysis based on the current state

B.

Create a roadmap to identify security baselines and controls.

C.

Identify key stakeholders to champion information security.

D.

Determine acceptable levels of information security risk.

Full Access
Question # 257

Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?

A.

Enforce the local regulation.

B.

Obtain legal guidance.

C.

Enforce the organization's information security policy.

D.

Obtain an independent assessment of the regulation.

Full Access
Question # 258

Which of the following is the PRIMARY reason to conduct a post-incident review?

A.

To aid in future risk assessments

B.

To improve the response process

C.

To determine whether digital evidence is admissible

D.

To notify regulatory authorities

Full Access
Question # 259

Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?

A.

A security information and event management (SIEM) system

B.

An intrusion prevention system (IPS)

C.

A virtual private network (VPN) with multi-factor authentication (MFA)

D.

An identity and access management (IAM) system

Full Access
Question # 260

Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?

A.

Alive demonstration of the third-party supplier's security capabilities

B.

The ability to i third-party supplier's IT systems and processes

C.

Third-party security control self-assessment (CSA) results

D.

An independent review report indicating compliance with industry standards

Full Access
Question # 261

An information security policy was amended recently to support an organization's new information security strategy. Which of the following should be the information security manager's NEXT step?

A.

Evaluate the alignment with business strategy.

B.

Review technical controls.

C.

Update standards and procedures.

D.

Refresh the security training program.

Full Access
Question # 262

An information security program is BEST positioned for success when it is closely aligned with:

A.

information security best practices.

B.

recognized industry frameworks.

C.

information security policies.

D.

the information security strategy.

Full Access
Question # 263

Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?

A.

To ensure industry best practices for enterprise security are followed

B.

To establish the minimum level of controls needed

C.

To determine the desired state of enterprise security

D.

To satisfy auditors' recommendations for enterprise security

Full Access
Question # 264

Which of the following is the BEST way to enhance training for incident response teams?

A.

Perform post-incident reviews.

B.

Establish incident key performance indicators (KPIs).

C.

Conduct interviews with organizational units.

D.

Participate in emergency response activities.

Full Access
Question # 265

Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:

A.

strategy.

B.

risk assessments.

C.

key performance indicators (KPIs).

D.

standards.

Full Access
Question # 266

Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?

A.

Documentation of control procedures

B.

Standardization of compliance requirements

C.

Automation of controls

D.

Integration of assurance efforts

Full Access
Question # 267

Which of the following should be the FIRST step in developing an information security strategy?

A.

Determine acceptable levels of information security risk

B.

Create a roadmap to identify security baselines and controls

C.

Perform a gap analysis based on the current state

D.

Identify key stakeholders to champion information security

Full Access
Question # 268

When developing an asset classification program, which of the following steps should be completed FIRST?

A.

Categorize each asset.

B.

Create an inventory. &

C.

Create a business case for a digital rights management tool.

D.

Implement a data loss prevention (OLP) system.

Full Access
Question # 269

Which of the following provides the BEST evidence that a recently established infofmation security program is effective?

A.

The number of reported incidents has increased

B.

Regular IT balanced scorecards are communicated.

C.

Senior management has reported fewer junk emails.

D.

The number of tickets associated with IT incidents have stayed consistent

Full Access
Question # 270

Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?

A.

Enhanced data governance

B.

Increased third-party assurance

C.

)Improved incident management

D.

Reduced total cost of ownership (TCO)

Full Access
Question # 271

Which of the following is MOST important to include in a post-incident review following a data breach?

A.

An evaluation of the effectiveness of the information security strategy

B.

Evaluations of the adequacy of existing controls

C.

Documentation of regulatory reporting requirements

D.

A review of the forensics chain of custom

Full Access
Question # 272

Which of the following BEST supports effective communication during information security incidents7

A.

Frequent incident response training sessions

B.

Centralized control monitoring capabilities

C.

Responsibilities defined within role descriptions

D.

Predetermined service level agreements (SLAs)

Full Access
Question # 273

An organization has been penalized by regulatory authorities for failing to notify them of a major security breach that may have compromised customer data. Which of the following is MOST likely in need of review and updating to prevent similar penalties in the future?

A.

Information security policies and procedures

B.

Business continuity plan (BCP)

C.

Incident communication plan

D.

Incident response training program

Full Access
Question # 274

Which of the following backup methods requires the MOST time to restore data for an application?

A.

Full backup

B.

Incremental

C.

Differential

D.

Disk mirroring

Full Access
Question # 275

Which type of plan is PRIMARILY intended to reduce the potential impact of security events that may occur?

A.

Security awareness plan

B.

Business continuity plan (BCP)

C.

Disaster recovery plan (DRP)

D.

Incident response plan

Full Access
Question # 276

Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?

A.

Each process is assigned to a responsible party.

B.

The contact list is regularly updated.

C.

Minimum regulatory requirements are maintained.

D.

Senior management approval has been documented.

Full Access