Free Certification Practice Questions

ISACA-CISM

Loading…
Which of the following should be the FIRST step of incident response procedures?
#91
Which of the following is the BEST method for reducing the risk of data loss due to phishing attacks?
#92
Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?
#93
Which of the following is MOST important to the effectiveness of an information security program?
#94
Conducting a business impact analysis (BIA) BEST helps to identify:
#95
An employee who denies accusations of downloading inappropriate material to an organizational device has been discharged. In support of the disciplinary action the collection of legal evidence is required. Which of the following is the information security manager's BEST recommendation?
#96
An information security manager wants to implement a security information and event management (SIEM) system that will aggregate log data from all systems that control perimeter access. Which of the following would BEST support the business case for this initiative to senior management?
#97
Which of the following BEST protects against phishing attacks?
#98
The PRIMARY objective of performing a post-incident review is to:
#99
In a call center, the BEST reason to conduct a social engineering exercise is to:
#100
An information security risk analysis BEST assists an organization in ensuring that:
#101
Which of the following is the MOST effective way to address an organization's security concerns during contract negotiations with a third party?
#102
Which of the following would BEST enable effective decision-making?
#103
Which of the following is the BEST option to lower the cost to implement application security controls?
#104
Which of the following is the GREATEST benefit of effective information security governance?
#105
Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?
#106
Which of the following would be the MOST effective use of findings from a post-incident review?
#107
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
#108
Which of the following is MOST helpful in determining the realization of benefits from an information security program?
#109
During an internal compliance review, the review team discovers that a critical legacy application is unable to meet the organization's mandatory security requirements. Which of the following should be done FIRST?
#110
Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
#111
Which of the following is the PRIMARY benefit of an information security awareness training program?
#112
Which of the following MOST effectively supports an organization's security culture?
#113
A new type of ransomware has infected an organization's network. Which of the following would have BEST enabled the organization to detect this situation?
#114
Which of the following should an information security manager do FIRST upon notification of a potential security risk associated with a third-party service provider?
#115
Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
#116
Which of the following is BEST used to determine the maturity of an information security program?
#117
Which of the following should be done FIRST when developing an information security strategy that is aligned with organizational goals?
#118
A business impact analysis (BIA) BEST enables an organization to establish:
#119
Which of the following is the PRIMARY objective of developing an information security program that aligns with the information security strategy?
#120