CISM Final Assessment 1
Quiz Summary
0 of 150 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 150 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 150
1. Question
A software vendor has announced a zero-day vulnerability that exposes an organization’s critical business systems. The vendor has released an emergency patch. Which of the following should be the information security manager’s PRIMARY concern?
CorrectIncorrect -
Question 2 of 150
2. Question
What is the MOST important reason to regularly report information security risk to relevant stakeholders?
CorrectIncorrect -
Question 3 of 150
3. Question
Which of the following is MOST important to ensure ongoing senior management commitment to an organization’s information security strategy?
CorrectIncorrect -
Question 4 of 150
4. Question
A penetration test of a new system has identified a number of critical vulnerabilities, jeopardizing the go-live date. The information security manager is asked by the system owner to approve an exception to allow the system to be implemented without fixing the vulnerabilities. Which of the following is the MOST appropriate course of action?
CorrectIncorrect -
Question 5 of 150
5. Question
Which of the following information security activities is MOST helpful to support compliance with information security policy?
CorrectIncorrect -
Question 6 of 150
6. Question
Which of the following is MOST important to determine following the discovery and eradication of a malware attack?
CorrectIncorrect -
Question 7 of 150
7. Question
Which of the following is MOST helpful in ensuring an information security governance framework continues to support business objectives?
CorrectIncorrect -
Question 8 of 150
8. Question
Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?
CorrectIncorrect -
Question 9 of 150
9. Question
In order to understand an organization’s security posture, it is MOST important for an organization’s senior leadership to:
CorrectIncorrect -
Question 10 of 150
10. Question
Information security controls should be designed PRIMARILY based on:
CorrectIncorrect -
Question 11 of 150
11. Question
An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:
CorrectIncorrect -
Question 12 of 150
12. Question
An information security manager developing an incident response plan MUST ensure it includes:
CorrectIncorrect -
Question 13 of 150
13. Question
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
CorrectIncorrect -
Question 14 of 150
14. Question
Security program development is PRIMARILY driven by which of the following?
CorrectIncorrect -
Question 15 of 150
15. Question
An organization has identified a risk scenario that has low impact to the organization but is very costly to mitigate. Which risk treatment option is MOST appropriate in this situation?
CorrectIncorrect -
Question 16 of 150
16. Question
Prior to conducting a forensic examination, an information security manager should:
CorrectIncorrect -
Question 17 of 150
17. Question
The fundamental purpose of establishing security metrics is to:
CorrectIncorrect -
Question 18 of 150
18. Question
Which of the following presents the GREATEST challenge to a security operations center’s timely identification of potential security breaches?
CorrectIncorrect -
Question 19 of 150
19. Question
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
CorrectIncorrect -
Question 20 of 150
20. Question
An online bank identifies a successful network attack in progress. The bank should FIRST:
CorrectIncorrect -
Question 21 of 150
21. Question
Which of the following provides an information security manager with the MOST accurate indication of the organization’s ability to respond to a cyber attack?
CorrectIncorrect -
Question 22 of 150
22. Question
Which of the following would be MOST helpful to identify worst-case disruption scenarios?
CorrectIncorrect -
Question 23 of 150
23. Question
Which of the following BEST enables an organization to appropriately prioritize information security-focused projects?
CorrectIncorrect -
Question 24 of 150
24. Question
Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?
CorrectIncorrect -
Question 25 of 150
25. Question
Which of the following activities MUST be performed by an information security manager for change requests?
CorrectIncorrect -
Question 26 of 150
26. Question
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
CorrectIncorrect -
Question 27 of 150
27. Question
Which of the following is the MOST important factor of a successful information security program?
CorrectIncorrect -
Question 28 of 150
28. Question
Which of the following messages would be MOST effective in obtaining senior management’s commitment to information security management?
CorrectIncorrect -
Question 29 of 150
29. Question
When choosing the best controls to mitigate risk to acceptable levels, the information security manager s decision should be MAINLY driven by:
CorrectIncorrect -
Question 30 of 150
30. Question
A high-risk issue is discovered during an information security risk assessment of a legacy application. The business is unwilling to allocate the resources to remediate the issue. Which of the following would be the information security manager’s BEST course of action?
CorrectIncorrect -
Question 31 of 150
31. Question
The PRIMARY benefit of introducing a single point of administration in network monitoring is that it:
CorrectIncorrect -
Question 32 of 150
32. Question
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
CorrectIncorrect -
Question 33 of 150
33. Question
Which of the following is MOST important for building a robust information security culture within an organization?
CorrectIncorrect -
Question 34 of 150
34. Question
Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?
CorrectIncorrect -
Question 35 of 150
35. Question
Which of the following metrics BEST measures the effectiveness of an organization’s information security program?
CorrectIncorrect -
Question 36 of 150
36. Question
Which of the following is MOST important when conducting a forensic investigation?
CorrectIncorrect -
Question 37 of 150
37. Question
Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?
CorrectIncorrect -
Question 38 of 150
38. Question
An organization is aligning its incident response capability with a public cloud service provider. What should be the information security manager’s FIRST course of action?
CorrectIncorrect -
Question 39 of 150
39. Question
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
CorrectIncorrect -
Question 40 of 150
40. Question
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager’s BEST course of action?
CorrectIncorrect -
Question 41 of 150
41. Question
Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?
CorrectIncorrect -
Question 42 of 150
42. Question
Which of the following is MOST helpful for determining which information security policies should be implemented by an organization?
CorrectIncorrect -
Question 43 of 150
43. Question
Which of the following BEST ensures timely and reliable access to services?
CorrectIncorrect -
Question 44 of 150
44. Question
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
CorrectIncorrect -
Question 45 of 150
45. Question
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization’s information security strategy?
CorrectIncorrect -
Question 46 of 150
46. Question
Which of the following is an information security manager’s BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?
CorrectIncorrect -
Question 47 of 150
47. Question
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
CorrectIncorrect -
Question 48 of 150
48. Question
Which risk is introduced when using only sanitized data for the testing of applications?
CorrectIncorrect -
Question 49 of 150
49. Question
Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?
CorrectIncorrect -
Question 50 of 150
50. Question
Which of the following should be done FIRST when developing an information security program?
CorrectIncorrect -
Question 51 of 150
51. Question
The BEST way to identify the risk associated with a social engineering attack is to:
CorrectIncorrect -
Question 52 of 150
52. Question
Which of the following is MOST important to have in place to help ensure an organization’s cybersecurity program meets the needs of the business?
CorrectIncorrect -
Question 53 of 150
53. Question
Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?
CorrectIncorrect -
Question 54 of 150
54. Question
A recovery point objective (RPO) is required in which of the following?
CorrectIncorrect -
Question 55 of 150
55. Question
Which of the following provides the BEST assurance that security policies are applied across business operations?
CorrectIncorrect -
Question 56 of 150
56. Question
Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?
CorrectIncorrect -
Question 57 of 150
57. Question
A business unit is not complying with a control implemented to mitigate risk because doing so impacts the ability to achieve business goals. When reporting the noncompliance to senior management, what would be the information security manager’s BEST recommendation?
CorrectIncorrect -
Question 58 of 150
58. Question
Which of the following is MOST helpful for protecting an enterprise from advanced persistent threats (APTs)?
CorrectIncorrect -
Question 59 of 150
59. Question
Which of the following should be the PRIMARY consideration when developing an incident response plan?
CorrectIncorrect -
Question 60 of 150
60. Question
A strict new regulation is being finalized to address global concerns regarding cybersecurity. Which of the following should the information security manager do FIRST?
CorrectIncorrect -
Question 61 of 150
61. Question
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
CorrectIncorrect -
Question 62 of 150
62. Question
The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:
CorrectIncorrect -
Question 63 of 150
63. Question
A risk assessment exercise has identified the threat of a denial of service (DoS) attack. Executive management has decided to take no further action related to this risk. The MOST likely reason for this decision is:
CorrectIncorrect -
Question 64 of 150
64. Question
Which of the following is the BEST indication of an effective information security awareness training program?
CorrectIncorrect -
Question 65 of 150
65. Question
Penetration testing is MOST appropriate when a:
CorrectIncorrect -
Question 66 of 150
66. Question
Which of the following will result in the MOST accurate controls assessment?
CorrectIncorrect -
Question 67 of 150
67. Question
The MOST important reason for having an information security manager serve on the change management committee is to:
CorrectIncorrect -
Question 68 of 150
68. Question
Of the following, who is in the BEST position to evaluate business impacts?
CorrectIncorrect -
Question 69 of 150
69. Question
Which of the following should be done FIRST when establishing a new data protection program that must comply with applicable data privacy regulations?
CorrectIncorrect -
Question 70 of 150
70. Question
Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
CorrectIncorrect -
Question 71 of 150
71. Question
Which of the following is the BEST way to help ensure an organization’s risk appetite will be considered as part of the risk treatment process?
CorrectIncorrect -
Question 72 of 150
72. Question
Which of the following is MOST important to include in a post-incident review following a data breach?
CorrectIncorrect -
Question 73 of 150
73. Question
An organization plans to leverage popular social network platforms to promote its products and services. Which of the following is the BEST course of action for the information security manager to support this initiative?
CorrectIncorrect -
Question 74 of 150
74. Question
Which of the following BEST supports information security management in the event of organizational changes in security personnel?
CorrectIncorrect -
Question 75 of 150
75. Question
Which of the following is the BEST tool to monitor the effectiveness of information security governance?
CorrectIncorrect -
Question 76 of 150
76. Question
Management decisions concerning information security investments will be MOST effective when they are based on:
CorrectIncorrect -
Question 77 of 150
77. Question
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
CorrectIncorrect -
Question 78 of 150
78. Question
Which of the following change management procedures is MOST likely to cause concern to the information security manager?
CorrectIncorrect -
Question 79 of 150
79. Question
Which is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?
CorrectIncorrect -
Question 80 of 150
80. Question
Which of the following should be the MOST important consideration when establishing information security policies for an organization?
CorrectIncorrect -
Question 81 of 150
81. Question
If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:
CorrectIncorrect -
Question 82 of 150
82. Question
An organization’s marketing department wants to use an online collaboration service, which is not in compliance with the information security policy. A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
CorrectIncorrect -
Question 83 of 150
83. Question
In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:
CorrectIncorrect -
Question 84 of 150
84. Question
Which of the following is the BEST course of action for an information security manager to align security and business goals?
CorrectIncorrect -
Question 85 of 150
85. Question
What should be the information security manager’s FIRST step when updating an information security program?
CorrectIncorrect -
Question 86 of 150
86. Question
Which of the following defines the triggers within a business continuity plan (BCP)?
CorrectIncorrect -
Question 87 of 150
87. Question
A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager’s BEST course of action?
CorrectIncorrect -
Question 88 of 150
88. Question
Which of the following is the BEST indication of a successful information security culture?
CorrectIncorrect -
Question 89 of 150
89. Question
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
CorrectIncorrect -
Question 90 of 150
90. Question
Which of the following sources is MOST useful when planning a business-aligned information security program?
CorrectIncorrect -
Question 91 of 150
91. Question
Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?
CorrectIncorrect -
Question 92 of 150
92. Question
What is the BEST way to reduce the impact of a successful ransomware attack?
CorrectIncorrect -
Question 93 of 150
93. Question
Which of the following is the BEST approach for governing noncompliance with security requirements?
CorrectIncorrect -
Question 94 of 150
94. Question
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
CorrectIncorrect -
Question 95 of 150
95. Question
In which cloud model does the cloud service buyer assume the MOST security responsibility?
CorrectIncorrect -
Question 96 of 150
96. Question
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
CorrectIncorrect -
Question 97 of 150
97. Question
Which of the following is the FIRST step to establishing an effective information security program?
CorrectIncorrect -
Question 98 of 150
98. Question
An information security manager believes that information has been classified inappropriately, increasing the risk of a breach. Which of the following is the information security manager’s BEST action?
CorrectIncorrect -
Question 99 of 150
99. Question
Which of the following BEST supports the incident management process for attacks on an organization’s supply chain?
CorrectIncorrect -
Question 100 of 150
100. Question
Which of the following is MOST useful to an information security manager when conducting a post-incident review of an attack?
CorrectIncorrect -
Question 101 of 150
101. Question
Which of the following is MOST important for an information security manager to verify when selecting a third-party forensics provider?
CorrectIncorrect -
Question 102 of 150
102. Question
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
CorrectIncorrect -
Question 103 of 150
103. Question
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
CorrectIncorrect -
Question 104 of 150
104. Question
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
CorrectIncorrect -
Question 105 of 150
105. Question
An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?
CorrectIncorrect -
Question 106 of 150
106. Question
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?
CorrectIncorrect -
Question 107 of 150
107. Question
When investigating an information security incident details of the incident should be shared:
CorrectIncorrect -
Question 108 of 150
108. Question
The PRIMARY advantage of involving end users in continuity planning is that they:
CorrectIncorrect -
Question 109 of 150
109. Question
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability. Before relying on this certification, it is MOST important that the information security manager confirms that the:
CorrectIncorrect -
Question 110 of 150
110. Question
Which of the following service offerings in a typical Infrastructure as a Service (IaaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?
CorrectIncorrect -
Question 111 of 150
111. Question
Which of the following roles is BEST able to influence the security culture within an organization?
CorrectIncorrect -
Question 112 of 150
112. Question
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
CorrectIncorrect -
Question 113 of 150
113. Question
Which of the following is the BEST evidence of alignment between corporate and information security governance?
CorrectIncorrect -
Question 114 of 150
114. Question
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
CorrectIncorrect -
Question 115 of 150
115. Question
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
CorrectIncorrect -
Question 116 of 150
116. Question
Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?
CorrectIncorrect -
Question 117 of 150
117. Question
Which of the following is the MOST critical factor for information security program success?
CorrectIncorrect -
Question 118 of 150
118. Question
Which of the following events would MOST likely require a revision to the information security program?
CorrectIncorrect -
Question 119 of 150
119. Question
Which of the following is the MOST important consideration when establishing an organization’s information security governance committee?
CorrectIncorrect -
Question 120 of 150
120. Question
An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident it is MOST important for the security manager to:
CorrectIncorrect -
Question 121 of 150
121. Question
Which of the following is the BEST way to ensure the capability to restore clean data after a ransomware attack?
CorrectIncorrect -
Question 122 of 150
122. Question
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
CorrectIncorrect -
Question 123 of 150
123. Question
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager’s FIRST course of action?
CorrectIncorrect -
Question 124 of 150
124. Question
Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?
CorrectIncorrect -
Question 125 of 150
125. Question
The MOST important attribute of a security control is that it is:
CorrectIncorrect -
Question 126 of 150
126. Question
Which of the following will BEST enable an effective information asset classification process?
CorrectIncorrect -
Question 127 of 150
127. Question
An information security manager has been notified about a compromised endpoint device. Which of the following is the BEST course of action to prevent further damage?
CorrectIncorrect -
Question 128 of 150
128. Question
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
CorrectIncorrect -
Question 129 of 150
129. Question
A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
CorrectIncorrect -
Question 130 of 150
130. Question
An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?
CorrectIncorrect -
Question 131 of 150
131. Question
An organization’s disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?
CorrectIncorrect -
Question 132 of 150
132. Question
Which of the following is a desired outcome of information security governance?
CorrectIncorrect -
Question 133 of 150
133. Question
When designing an information security risk monitoring framework, it is MOST important to ensure:
CorrectIncorrect -
Question 134 of 150
134. Question
Which of the following BEST enables staff acceptance of information security policies?
CorrectIncorrect -
Question 135 of 150
135. Question
Which of the following is the BEST way to rigorously test a disaster recovery plan (DRP) for a mission-critical system without disrupting business operations?
CorrectIncorrect -
Question 136 of 150
136. Question
An information security manager is concerned with continued security policy violations in a particular business unit despite recent efforts to rectify the situation. What is the BEST course of action?
CorrectIncorrect -
Question 137 of 150
137. Question
Which of the following BEST facilitates an information security manager’s efforts to obtain senior management commitment for an information security program?
CorrectIncorrect -
Question 138 of 150
138. Question
Which of the following is PRIMARILY determined by asset classification?
CorrectIncorrect -
Question 139 of 150
139. Question
Which of the following is MOST helpful for aligning security operations with the IT governance framework?
CorrectIncorrect -
Question 140 of 150
140. Question
An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?
CorrectIncorrect -
Question 141 of 150
141. Question
An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?
CorrectIncorrect -
Question 142 of 150
142. Question
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
CorrectIncorrect -
Question 143 of 150
143. Question
Which of the following BEST demonstrates return on investment (ROI) for an information security initiative?
CorrectIncorrect -
Question 144 of 150
144. Question
Which of the following is BEST suited to provide regular reporting to the board regarding the status of compliance to a global security standard?
CorrectIncorrect -
Question 145 of 150
145. Question
Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?
CorrectIncorrect -
Question 146 of 150
146. Question
Which of the following is the MOST important reason to implement information security governance?
CorrectIncorrect -
Question 147 of 150
147. Question
Which of the following is a PRIMARY objective of an information security governance framework?
CorrectIncorrect -
Question 148 of 150
148. Question
Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?
CorrectIncorrect -
Question 149 of 150
149. Question
An information security manager has contracted with a company to design security architecture for an application. Which of the following is accountable for identification associated with this initiative?
CorrectIncorrect -
Question 150 of 150
150. Question
Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?
CorrectIncorrect