Free Certification Practice Questions

ISACA-CISM

Loading…
A security incident has been reported within an organization. When should an information security manager contact the information owner?
#1
An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?
#2
Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?
#3
Which of the following information security practices would BEST prevent a SQL injection attack?
#4
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
#5
Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?
#6
An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?
#7
A spear phishing attack was used to trick a user into installing a Trojan onto a workstation. Which of the following would have been MOST effective in preventing this attack from succeeding?
#8
Which of the following is the MOST effective method of preventing deliberate internal security breaches?
#9
An information security manager has been asked to provide regular status reports to senior management regarding the information security program. Which of the following would provide the MOST helpful information?
#10
The PRIMARY purpose of a penetration test is to:
#11
An information security policy was amended recently to support an organization's new information security strategy. Which of the following should be the information security manager's NEXT step?
#12
Which of the following needs to be established FIRST in order to categorize data properly?
#13
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
#14
An organization is performing an annual review of its risk landscape. Which of the following anticipated changes will have the MOST significant impact on the information security strategy?
#15
To optimize the implementation of information security governance in an organization, an information security manager should:
#16
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
#17
Which of the following should be the PRIMARY goal of information security?
#18
Which of the following clauses would represent the MOST significant potential exposure if included in a contract with a third-party service provider?
#19
Which of the following should be the PRIMARY basis for determining information security objectives?
#20
Which of the following is MOST helpful for determining priorities when creating a long-term information security roadmap?
#21
A KEY consideration in the use of quantitative risk analysis is that it:
#22
Which of the following is MOST important when selecting an information security metric?
#23
A situation where an organization has unpatched IT systems in violation of the patching policy should be treated as:
#24
How does data discovery assist with data classification?
#25
Which of the following will BEST facilitate timely and effective incident response?
#26
Which of the following MOST effectively communicates the current risk profile to senior management after controls are applied?
#27
Which of the following processes should be done NEXT after completing a business impact analysis (BIA)?
#28
Which of the following has the GREATEST impact on efforts to improve an organization's security posture?
#29
Which of the following is MOST important to include in an information security policy?
#30