CISM Final Assessment 2
Quiz Summary
0 of 150 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 150 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 150
1. Question
Which of the following is an information security manager’s MOST important consideration when exploring the use of a third-party provider to handle an IT function?
CorrectIncorrect -
Question 2 of 150
2. Question
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
CorrectIncorrect -
Question 3 of 150
3. Question
When an organization decides to accept a risk, it should mean the cost to mitigate:
CorrectIncorrect -
Question 4 of 150
4. Question
Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?
CorrectIncorrect -
Question 5 of 150
5. Question
Due to changes in an organization’s environment, security controls may no longer be adequate. What is the information security manager’s BEST course of action?
CorrectIncorrect -
Question 6 of 150
6. Question
What is the PRIMARY benefit to an organization when information security program requirements are aligned with employment and staffing processes?
CorrectIncorrect -
Question 7 of 150
7. Question
When developing an asset classification program, which of the following steps should be completed FIRST?
CorrectIncorrect -
Question 8 of 150
8. Question
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
CorrectIncorrect -
Question 9 of 150
9. Question
Which of the following is the BEST indicator of an emerging incident?
CorrectIncorrect -
Question 10 of 150
10. Question
An organization has discovered a recurring problem with unsecure code being released into production. Which of the following is the information security manager action?
CorrectIncorrect -
Question 11 of 150
11. Question
When developing a categorization method for security incidents, the categories MUST:
CorrectIncorrect -
Question 12 of 150
12. Question
Which of the following is MOST likely to be impacted when emerging technologies are introduced to an organization?
CorrectIncorrect -
Question 13 of 150
13. Question
An organization’s main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated risk?
CorrectIncorrect -
Question 14 of 150
14. Question
Which of the following is the MOST important criterion when deciding whether to accept residual risk?
CorrectIncorrect -
Question 15 of 150
15. Question
An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?
CorrectIncorrect -
Question 16 of 150
16. Question
When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?
CorrectIncorrect -
Question 17 of 150
17. Question
A data-hosting organization’s data center houses servers, applications, and data for a large number of geographically dispersed customers. Which of the following strategies is the BEST approach for developing a physical access control policy for the organization?
CorrectIncorrect -
Question 18 of 150
18. Question
Which of the following is a PRIMARY benefit of managed security solutions?
CorrectIncorrect -
Question 19 of 150
19. Question
Which of the following is an example of risk mitigation?
CorrectIncorrect -
Question 20 of 150
20. Question
Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?
CorrectIncorrect -
Question 21 of 150
21. Question
Following a successful attack, an information security manager should be confident the malware has not continued to spread at the completion of which incident response phase?
CorrectIncorrect -
Question 22 of 150
22. Question
Which of the following is the BEST method to align an information security strategic plan to the corporate strategy?
CorrectIncorrect -
Question 23 of 150
23. Question
Which of the following would BEST ensure that security is integrated during application development?
CorrectIncorrect -
Question 24 of 150
24. Question
Which of the following is MOST important in increasing the effectiveness of incident responders?
CorrectIncorrect -
Question 25 of 150
25. Question
Which of the following should be the PRIMARY objective of the information security incident response process?
CorrectIncorrect -
Question 26 of 150
26. Question
An incident response team has been assembled from a group of experienced individuals. Which type of exercise would be MOST beneficial for the team at the first drill?
CorrectIncorrect -
Question 27 of 150
27. Question
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager’s FIRST course of action?
CorrectIncorrect -
Question 28 of 150
28. Question
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
CorrectIncorrect -
Question 29 of 150
29. Question
A PRIMARY purpose of creating security policies is to:
CorrectIncorrect -
Question 30 of 150
30. Question
The MAIN benefit of implementing a data loss prevention (DLP) solution is to:
CorrectIncorrect -
Question 31 of 150
31. Question
Which of the following is the MOST important detail to capture in an organization’s risk register?
CorrectIncorrect -
Question 32 of 150
32. Question
Which of the following is the GREATEST benefit of information asset classification?
CorrectIncorrect -
Question 33 of 150
33. Question
While classifying information assets, an information security manager notices that several production databases do not have owners assigned to them. What the information security manager address this situation?
CorrectIncorrect -
Question 34 of 150
34. Question
An organization’s research department plans to apply machine learning algorithms on a large data set containing customer names and purchase history. The risk leakage is considered high impact. Which of the following is the BEST risk treatment option in this situation?
CorrectIncorrect -
Question 35 of 150
35. Question
IT projects have gone over budget with too many security controls being added post-production. Which of the following would MOST help to ensure that relevant to a project?
CorrectIncorrect -
Question 36 of 150
36. Question
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
CorrectIncorrect -
Question 37 of 150
37. Question
Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?
CorrectIncorrect -
Question 38 of 150
38. Question
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
CorrectIncorrect -
Question 39 of 150
39. Question
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
CorrectIncorrect -
Question 40 of 150
40. Question
An organization is increasingly using Software as a Service (SaaS) to replace in-house hosting and support of IT applications. Which of the following would be the MOST effective way to help ensure procurement decisions consider information security concerns?
CorrectIncorrect -
Question 41 of 150
41. Question
Which of the following should be the KEY consideration when creating an information security communication plan with industry peers?
CorrectIncorrect -
Question 42 of 150
42. Question
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
CorrectIncorrect -
Question 43 of 150
43. Question
An organization recently purchased data loss prevention (DLP) software but soon discovered the software fails to detect or prevent data loss.
Which of the following should the information security manager do FIRST?
CorrectIncorrect -
Question 44 of 150
44. Question
Network isolation techniques are immediately implemented after a security breach to.
CorrectIncorrect -
Question 45 of 150
45. Question
Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?
CorrectIncorrect -
Question 46 of 150
46. Question
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
CorrectIncorrect -
Question 47 of 150
47. Question
Which of the following has the GREATEST positive impact on the ability to execute a disaster recovery plan (DRP)?
CorrectIncorrect -
Question 48 of 150
48. Question
Which of the following is MOST important to include in monthly information security reports to the board?
CorrectIncorrect -
Question 49 of 150
49. Question
Which of the following activities is designed to handle a control failure that leads to a breach?
CorrectIncorrect -
Question 50 of 150
50. Question
Which of the following is MOST important to consider when aligning a security awareness program with the organization’s business strategy?
CorrectIncorrect -
Question 51 of 150
51. Question
Which of the following BEST indicates that information assets are classified accurately?
CorrectIncorrect -
Question 52 of 150
52. Question
Reevaluation of risk is MOST critical when there is:
CorrectIncorrect -
Question 53 of 150
53. Question
Which of the following BEST supports investments in an information security program?
CorrectIncorrect -
Question 54 of 150
54. Question
Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?
CorrectIncorrect -
Question 55 of 150
55. Question
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
CorrectIncorrect -
Question 56 of 150
56. Question
An organization is implementing an information security governance framework. To communicate the program’s effectiveness to stakeholders, it is MOST important to establish:
CorrectIncorrect -
Question 57 of 150
57. Question
Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?
CorrectIncorrect -
Question 58 of 150
58. Question
Which of the following is the BEST way to obtain support for a new organization-wide information security program?
CorrectIncorrect -
Question 59 of 150
59. Question
To confirm that a third-party provider complies with an organization’s information security requirements, it is MOST important to ensure:
CorrectIncorrect -
Question 60 of 150
60. Question
Which of the following BEST enables an organization to transform its culture to support information security?
CorrectIncorrect -
Question 61 of 150
61. Question
An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
CorrectIncorrect -
Question 62 of 150
62. Question
Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?
CorrectIncorrect -
Question 63 of 150
63. Question
Which of the following should be given the HIGHEST priority during an information security post-incident review?
CorrectIncorrect -
Question 64 of 150
64. Question
Which of the following is the BEST course of action when an online company discovers a network attack in progress?
CorrectIncorrect -
Question 65 of 150
65. Question
Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?
CorrectIncorrect -
Question 66 of 150
66. Question
When properly implemented, secure transmission protocols protect transactions:
CorrectIncorrect -
Question 67 of 150
67. Question
An organization is in the process of acquiring a new company. Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
CorrectIncorrect -
Question 68 of 150
68. Question
The PRIMARY objective of a post-incident review of an information security incident is to:
CorrectIncorrect -
Question 69 of 150
69. Question
The MOST appropriate time to conduct a disaster recovery test would be after:
CorrectIncorrect -
Question 70 of 150
70. Question
Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
CorrectIncorrect -
Question 71 of 150
71. Question
Which of the following is an information security manager’s MOST important course of action when responding to a major security incident that could disrupt the business?
CorrectIncorrect -
Question 72 of 150
72. Question
An information security manager determines there are a significant number of exceptions to a newly released industry-required security standard. Which of the following should be done NEXT?
CorrectIncorrect -
Question 73 of 150
73. Question
Which of the following BEST facilitates effective incident response testing?
CorrectIncorrect -
Question 74 of 150
74. Question
Which of the following is the BEST indication of effective information security governance?
CorrectIncorrect -
Question 75 of 150
75. Question
The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization. Which of the following should be done FIRST?
CorrectIncorrect -
Question 76 of 150
76. Question
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
CorrectIncorrect -
Question 77 of 150
77. Question
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
CorrectIncorrect -
Question 78 of 150
78. Question
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
CorrectIncorrect -
Question 79 of 150
79. Question
Which of the following should an information security manager do FIRST upon learning of noncompliance with an impending information security regulatory change?
CorrectIncorrect -
Question 80 of 150
80. Question
Which of the following is MOST critical when creating an incident response plan?
CorrectIncorrect -
Question 81 of 150
81. Question
Which of the following would BEST help to ensure appropriate security controls are built into software?
CorrectIncorrect -
Question 82 of 150
82. Question
Which of the following will BEST facilitate the integration of information security governance into enterprise governance?
CorrectIncorrect -
Question 83 of 150
83. Question
Which of the following should an information security manager do FIRST when noncompliance with security standards is identified?
CorrectIncorrect -
Question 84 of 150
84. Question
Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?
CorrectIncorrect -
Question 85 of 150
85. Question
When deciding to move to a cloud-based model, the FIRST consideration should be:
CorrectIncorrect -
Question 86 of 150
86. Question
Which of the following is the PRIMARY objective of incident triage?
CorrectIncorrect -
Question 87 of 150
87. Question
Who is accountable for ensuring risk mitigation is effective?
CorrectIncorrect -
Question 88 of 150
88. Question
Which of the following BEST enables an information security manager to obtain organizational support for the implementation of security controls?
CorrectIncorrect -
Question 89 of 150
89. Question
To support effective risk decision making, which of the following is MOST important to have in place?
CorrectIncorrect -
Question 90 of 150
90. Question
Which of the following parties should be responsible for determining access levels to an application that processes client information?
CorrectIncorrect -
Question 91 of 150
91. Question
What should be an information security manager’s MOST important consideration when developing a multi-year plan?
CorrectIncorrect -
Question 92 of 150
92. Question
When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?
CorrectIncorrect -
Question 93 of 150
93. Question
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
CorrectIncorrect -
Question 94 of 150
94. Question
Who is BEST suited to determine how the information in a database should be classified?
CorrectIncorrect -
Question 95 of 150
95. Question
Which of the following is an incident containment method?
CorrectIncorrect -
Question 96 of 150
96. Question
A CISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider’s data center. Which of the following should the CISO do FIRST?
CorrectIncorrect -
Question 97 of 150
97. Question
Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?
CorrectIncorrect -
Question 98 of 150
98. Question
Which of the following is the PRIMARY role of an information security manager in a software development project?
CorrectIncorrect -
Question 99 of 150
99. Question
Which of the following MOST effectively identifies issues related to noncompliance with legal, regulatory, and contractual requirements?
CorrectIncorrect -
Question 100 of 150
100. Question
Which of the following is MOST helpful for fostering an effective information security culture?
CorrectIncorrect -
Question 101 of 150
101. Question
Which of the following is MOST important to convey to employees in building a security risk-aware culture?
CorrectIncorrect -
Question 102 of 150
102. Question
Which of the following is the PRIMARY objective of integrating information security governance into corporate governance?
CorrectIncorrect -
Question 103 of 150
103. Question
Which of the following is an information security manager’s MOST important action to mitigate the risk associated with malicious software?
CorrectIncorrect -
Question 104 of 150
104. Question
Which of the following is the PRIMARY reason for granting a security exception?
CorrectIncorrect -
Question 105 of 150
105. Question
Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?
CorrectIncorrect -
Question 106 of 150
106. Question
An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?
CorrectIncorrect -
Question 107 of 150
107. Question
Which type of plan is PRIMARILY intended to reduce the potential impact of security events that may occur?
CorrectIncorrect -
Question 108 of 150
108. Question
Which of the following is the MOST important outcome of strategic alignment of corporate and information security governance?
CorrectIncorrect -
Question 109 of 150
109. Question
Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization’s business goals?
CorrectIncorrect -
Question 110 of 150
110. Question
Which of the following BEST enables the integration of information security governance into corporate governance?
CorrectIncorrect -
Question 111 of 150
111. Question
Which of the following contributes MOST to the effectiveness of information security governance?
CorrectIncorrect -
Question 112 of 150
112. Question
Which of the following is the BEST approach for addressing noncompliance with security standards?
CorrectIncorrect -
Question 113 of 150
113. Question
Which of the following is the BEST method for managing information security compliance of third-party suppliers?
CorrectIncorrect -
Question 114 of 150
114. Question
An organization is in the process of creating an agreement with a cloud provider. Who should determine the third party’s destruction schedule for the organization’s information?
CorrectIncorrect -
Question 115 of 150
115. Question
Which of the following is the BEST course of action when an organization’s incident response team does not have expertise in forensic analysis?
CorrectIncorrect -
Question 116 of 150
116. Question
What should be the FIRST step when investigating an employee suspected of inappropriately downloading proprietary information?
CorrectIncorrect -
Question 117 of 150
117. Question
Which of the following is MOST critical to ensure that information security incidents are managed properly?
CorrectIncorrect -
Question 118 of 150
118. Question
The GREATEST challenge when attempting data recovery of a specific file during forensic analysis is when:
CorrectIncorrect -
Question 119 of 150
119. Question
Which of the following is MOST helpful in determining the criticality of an organization’s business functions?
CorrectIncorrect -
Question 120 of 150
120. Question
The contribution of recovery point objective (RPO) to disaster recovery is to:
CorrectIncorrect -
Question 121 of 150
121. Question
An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:
CorrectIncorrect -
Question 122 of 150
122. Question
Which of the following should be established FIRST when implementing an Information security governance framework?
CorrectIncorrect -
Question 123 of 150
123. Question
An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?
CorrectIncorrect -
Question 124 of 150
124. Question
A third-party audit of an organization’s network security has identified several critical risks. Which of the following should the information security manager do NEXT?
CorrectIncorrect -
Question 125 of 150
125. Question
Which of the following provides the BEST evidence that a recently established information security program is effective?
CorrectIncorrect -
Question 126 of 150
126. Question
An investigation of a recent security incident determined that the root cause was negligent handling of incident alerts by system administrators. What is the BEST way for the information security manager to address this issue?
CorrectIncorrect -
Question 127 of 150
127. Question
An organization is the victim or a targeted attack and is unaware of the compromise until a security analyst notices an additional user account on the firewall. The implementation of which of the following would have detected the incident?
CorrectIncorrect -
Question 128 of 150
128. Question
Of the following, who is accountable for data loss in the event of an information security incident at a third-party provider?
CorrectIncorrect -
Question 129 of 150
129. Question
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
CorrectIncorrect -
Question 130 of 150
130. Question
Which of the following would BEST guide the development and maintenance of an information security program?
CorrectIncorrect -
Question 131 of 150
131. Question
Which of the following BEST indicates effective information security governance?
CorrectIncorrect -
Question 132 of 150
132. Question
The MOST useful technique for maintaining management support for the information security program is:
CorrectIncorrect -
Question 133 of 150
133. Question
When remote access is granted to a company’s internal network, the MOST important consideration should be that access is provided:
CorrectIncorrect -
Question 134 of 150
134. Question
Which of the following should be triggered FIRST when unknown malware has infected an organization’s critical system?
CorrectIncorrect -
Question 135 of 150
135. Question
Which of the following is the FIRST step in developing a business impact analysis (BIA)?
CorrectIncorrect -
Question 136 of 150
136. Question
Which of the following is MOST important when defining how an information security budget should be allocated?
CorrectIncorrect -
Question 137 of 150
137. Question
A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
CorrectIncorrect -
Question 138 of 150
138. Question
Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?
CorrectIncorrect -
Question 139 of 150
139. Question
Which of the following BEST enables an organization to measure the total time that operations can be sustained at an alternative site designated in the business continuity plan (BCP)?
CorrectIncorrect -
Question 140 of 150
140. Question
Which of the following has the GREATEST influence on the successful integration of information security within the business?
CorrectIncorrect -
Question 141 of 150
141. Question
Which of the following is the MOST important consideration to support potential legal action when responding to a security incident?
CorrectIncorrect -
Question 142 of 150
142. Question
An incident response team has established that an application has been breached. Which of the following should be done NEXT?
CorrectIncorrect -
Question 143 of 150
143. Question
A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager’s FIRST step in addressing the issue should be to:
CorrectIncorrect -
Question 144 of 150
144. Question
Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
CorrectIncorrect -
Question 145 of 150
145. Question
Which of the following BEST mitigates the risk or information loss caused by a cloud service provider becoming insolvent?
CorrectIncorrect -
Question 146 of 150
146. Question
An information security team has been tasked with identifying confidential data within the organization to formalize its asset classification scheme. The MOST relevant input would be provided by:
CorrectIncorrect -
Question 147 of 150
147. Question
Which of the following is the PRIMARY reason to conduct a post-incident review?
CorrectIncorrect -
Question 148 of 150
148. Question
Which of the following is the BEST way to protect against unauthorized access to an encrypted file sent via email?
CorrectIncorrect -
Question 149 of 150
149. Question
The PRIMARY purpose of implementing information security governance metrics is to:
CorrectIncorrect -
Question 150 of 150
150. Question
Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?
CorrectIncorrect