Free Certification Practice Questions

ISACA-CISM

Loading…
Which of the following would BEST ensure that security is integrated during application development?
#181
Which of the following is MOST important in increasing the effectiveness of incident responders?
#182
Which of the following should be the PRIMARY objective of the information security incident response process?
#183
An incident response team has been assembled from a group of experienced individuals. Which type of exercise would be MOST beneficial for the team at the first drill?
#184
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
#185
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
#186
What should a global information security manager do FIRST when informed that a new regulation with significant impact will go into effect soon?
#187
Which of the following will have the MOST negative impact to the effectiveness of incident response processes?
#188
Which of the following tasks would provide a newly appointed information security manager with the BEST view of the organization's existing security posture?
#189
Which of the following is the MOST important consideration when developing incident classification methods?
#190
Who should decide whether a specific control should be changed once risk is approved for mitigation?
#191
When determining key risk indicators (KRIs) for use in an information security program it is MOST important to select:
#192
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
#193
Senior management has requested a budget cut for the information security program in the coming fiscal year. Which of the following should be the information security manager's FIRST course of action?
#194
What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?
#195
What is the PRIMARY objective of information security involvement in the change management process?
#196
The MOST important reason for an information security manager to be involved in the change management process is to ensure that:
#197
Which of the following is MOST likely to trigger an update and revision of information security policies?
#198
A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator, and application administrator. What is the manager's BEST course of action?
#199
Which of the following should an information security manager do FIRST when assessing conflicting requirements between the global organization's security standards and local regulations?
#200
Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?
#201
Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?
#202
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
#203
The PRIMARY reason for senior management to monitor information security metrics is to ensure:
#204
Which of the following is the MOST important reason to perform a privacy impact assessment?
#205
An information security team plans to increase password complexity requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
#206
To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:
#207
Which of the following is the BEST indication of a mature information security program?
#208
An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?
#209
Which type of recovery site is MOST reliable and can support stringent recovery requirements?
#210