CISM Final Assessment 3
Quiz Summary
0 of 150 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 150 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 150
1. Question
Which of the following should be done FIRST when developing an information security strategy?
CorrectIncorrect -
Question 2 of 150
2. Question
A business impact analysis (BIA) should be periodically executed PRIMARILY to:
CorrectIncorrect -
Question 3 of 150
3. Question
While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?
CorrectIncorrect -
Question 4 of 150
4. Question
Which of the following BEST enables an information security manager to demonstrate the effectiveness of the information security and risk program to senior management?
CorrectIncorrect -
Question 5 of 150
5. Question
Which of the following would BEST justify spending for a compensating control?
CorrectIncorrect -
Question 6 of 150
6. Question
Which or the following is the BEST way to monitor for advanced persistent threats (APT) in an organization?
CorrectIncorrect -
Question 7 of 150
7. Question
In response to recent ransomware threats, an organization deployed a new endpoint detection and response (EDR) solution in its employee laptops. Of the following, who should be accountable for reviewing the solution to verify it has been properly deployed and configured?
CorrectIncorrect -
Question 8 of 150
8. Question
An organization’s quality process can BEST support security management by providing:
CorrectIncorrect -
Question 9 of 150
9. Question
Which of the following is the MOST important consideration when defining an information security framework?
CorrectIncorrect -
Question 10 of 150
10. Question
Which of the following is the MOST important consideration for reporting risk assessment results to senior management?
CorrectIncorrect -
Question 11 of 150
11. Question
Which of the following is the BEST way to determine the effectiveness of an incident response plan?
CorrectIncorrect -
Question 12 of 150
12. Question
Which of the following should be an information security manager’s MOST important consideration when determining the priority for implementing security controls?
CorrectIncorrect -
Question 13 of 150
13. Question
Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?
CorrectIncorrect -
Question 14 of 150
14. Question
Which of the following should be done FIRST when implementing a security program?
CorrectIncorrect -
Question 15 of 150
15. Question
Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?
CorrectIncorrect -
Question 16 of 150
16. Question
Which of the following is an example of a deterrent control?
CorrectIncorrect -
Question 17 of 150
17. Question
An information security manager has completed a risk assessment and has determined the residual risk. Which of the following should be the NEXT step?
CorrectIncorrect -
Question 18 of 150
18. Question
Which of the following BEST enables an organization to maintain an appropriate security control environment?
CorrectIncorrect -
Question 19 of 150
19. Question
Which of the following is MOST important for responding effectively to security breaches?
CorrectIncorrect -
Question 20 of 150
20. Question
Which of the following is the BEST method for assisting with incident containment in an Infrastructure as a Service (IaaS) cloud environment?
CorrectIncorrect -
Question 21 of 150
21. Question
Which of the following should be performed FIRST in response to a new information security regulation?
CorrectIncorrect -
Question 22 of 150
22. Question
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?
CorrectIncorrect -
Question 23 of 150
23. Question
Which of the following is the MOST important reason to consider organizational culture when developing an information security program?
CorrectIncorrect -
Question 24 of 150
24. Question
Which of the following processes BEST supports the evaluation of incident response effectiveness?
CorrectIncorrect -
Question 25 of 150
25. Question
Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization’s hosted payroll service provider?
CorrectIncorrect -
Question 26 of 150
26. Question
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
CorrectIncorrect -
Question 27 of 150
27. Question
An organization is strategizing on how to improve security awareness. Which of the following is MOST important to consider when developing this strategy?
CorrectIncorrect -
Question 28 of 150
28. Question
A penetration test against an organization’s external web application shows several vulnerabilities. Which of the following presents the GREATEST concern?
CorrectIncorrect -
Question 29 of 150
29. Question
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
CorrectIncorrect -
Question 30 of 150
30. Question
Which of the following would be the BEST way to maintain organization-wide support for an information security strategy?
CorrectIncorrect -
Question 31 of 150
31. Question
Several critical systems have been compromised with malware. Which of the following is the BEST strategy to eradicate this incident?
CorrectIncorrect -
Question 32 of 150
32. Question
Which of the following is the MOST important success factor for maintaining an organizational security-aware culture?
CorrectIncorrect -
Question 33 of 150
33. Question
Senior management has expressed concern that the organization’s intrusion prevention system (IPS) may repeatedly disrupt business operations. Which of the following BEST indicates that the information security manager has tuned the system to address this concern?
CorrectIncorrect -
Question 34 of 150
34. Question
Which of the following metrics would BEST monitor how well information security requirements are incorporated into the change management process?
CorrectIncorrect -
Question 35 of 150
35. Question
Which of the following metrics is MOST appropriate for evaluating the incident notification process?
CorrectIncorrect -
Question 36 of 150
36. Question
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?
CorrectIncorrect -
Question 37 of 150
37. Question
Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?
CorrectIncorrect -
Question 38 of 150
38. Question
Of the following, who should be assigned as the owner of a newly identified risk related to an organization’s new payroll system?
CorrectIncorrect -
Question 39 of 150
39. Question
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
CorrectIncorrect -
Question 40 of 150
40. Question
Which of the following is MOST effective in gaining support for the information security strategy from senior management?
CorrectIncorrect -
Question 41 of 150
41. Question
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation of a critical monitoring process. Which of the following should be the information security manager’s GREATEST concern with this situation?
CorrectIncorrect -
Question 42 of 150
42. Question
An employee’s bring your own device (BYOD) smartphone has been lost. To reduce the risk associated with the loss of corporate sensitive data stored on the phone, the information security manager’s BEST course of action should have been to implement:
CorrectIncorrect -
Question 43 of 150
43. Question
Which of the following is the BEST approach for an information security manager to develop an organization’s information security strategy?
CorrectIncorrect -
Question 44 of 150
44. Question
Which of the following is the BEST way to monitor the effectiveness of security controls?
CorrectIncorrect -
Question 45 of 150
45. Question
An organization experienced a data breach that affected many of its clients. Legal counsel found out about this event only after a press release was issued. Which of the following would have been MOST helpful in preventing this situation?
CorrectIncorrect -
Question 46 of 150
46. Question
Which of the following would MOST effectively ensure that a new server is appropriately secured?
CorrectIncorrect -
Question 47 of 150
47. Question
Spoofing should be prevented because it may be used to:
CorrectIncorrect -
Question 48 of 150
48. Question
Which of the following is MOST important to have in place for an organization’s information security program to be effective?
CorrectIncorrect -
Question 49 of 150
49. Question
When assigning a risk owner, the MOST important consideration is to ensure the owner has:
CorrectIncorrect -
Question 50 of 150
50. Question
After a ransomware incident, an organization’s systems were restored. Which of the following should be of MOST concern to the information security manager?
CorrectIncorrect -
Question 51 of 150
51. Question
To improve the efficiency of the development of a new software application, security requirements should be defined:
CorrectIncorrect -
Question 52 of 150
52. Question
Which of the following would provide the MOST effective security outcome in an organization’s contract management process?
CorrectIncorrect -
Question 53 of 150
53. Question
Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?
CorrectIncorrect -
Question 54 of 150
54. Question
Who is accountable for approving an information security governance framework?
CorrectIncorrect -
Question 55 of 150
55. Question
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
CorrectIncorrect -
Question 56 of 150
56. Question
Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?
CorrectIncorrect -
Question 57 of 150
57. Question
Which of the following is the FIRST step when conducting a post-incident review?
CorrectIncorrect -
Question 58 of 150
58. Question
Which of the following BEST facilitates the effectiveness of cybersecurity incident response?
CorrectIncorrect -
Question 59 of 150
59. Question
A business requires a legacy version of an application to operate, but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
CorrectIncorrect -
Question 60 of 150
60. Question
An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?
CorrectIncorrect -
Question 61 of 150
61. Question
An email digital signature will:
CorrectIncorrect -
Question 62 of 150
62. Question
An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
CorrectIncorrect -
Question 63 of 150
63. Question
Which of the following BEST facilitates effective strategic alignment of security initiatives?
CorrectIncorrect -
Question 64 of 150
64. Question
Which of the following is MOST important to maintain integration among the incident response plan, business continuity plan (BCP), and disaster recovery plan (DRP)?
CorrectIncorrect -
Question 65 of 150
65. Question
An information security program is BEST positioned for success when it is closely aligned with:
CorrectIncorrect -
Question 66 of 150
66. Question
Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization’s IT asset inventory?
CorrectIncorrect -
Question 67 of 150
67. Question
Which of the following is the MOST important consideration when briefing executives about the current state of the information security program?
CorrectIncorrect -
Question 68 of 150
68. Question
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
CorrectIncorrect -
Question 69 of 150
69. Question
Which of the following is ESSENTIAL to ensuring effective incident response?
CorrectIncorrect -
Question 70 of 150
70. Question
Which of the following is the BEST indicator of an organization’s information security status?
CorrectIncorrect -
Question 71 of 150
71. Question
Which of the following practices is MOST effective for determining the adequacy of incident management operations?
CorrectIncorrect -
Question 72 of 150
72. Question
Which of the following MUST happen immediately following the identification of a malware incident?
CorrectIncorrect -
Question 73 of 150
73. Question
Which of the following is MOST effective in monitoring an organization’s existing risk?
CorrectIncorrect -
Question 74 of 150
74. Question
Which of the following BEST indicates that information security governance and corporate governance are integrated?
CorrectIncorrect -
Question 75 of 150
75. Question
Which of the following should be the PRIMARY basis for determining the value of assets?
CorrectIncorrect -
Question 76 of 150
76. Question
Which of the following is MOST helpful to identify whether information security policies have been followed?
CorrectIncorrect -
Question 77 of 150
77. Question
Which of the following is the MOST important reason to classify an incident after detection?
CorrectIncorrect -
Question 78 of 150
78. Question
Which of the following principles BEST addresses the protection of data from unauthorized modification?
CorrectIncorrect -
Question 79 of 150
79. Question
The MAIN reason for continuous monitoring of the security program is to:
CorrectIncorrect -
Question 80 of 150
80. Question
Which of the following would BEST enable the help desk to recognize an information security incident?
CorrectIncorrect -
Question 81 of 150
81. Question
Which of the following would be the GREATEST concern with the implementation of key risk indicators (KRIs)?
CorrectIncorrect -
Question 82 of 150
82. Question
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
CorrectIncorrect -
Question 83 of 150
83. Question
Which of the following is MOST important for the effective implementation of an information security governance program?
CorrectIncorrect -
Question 84 of 150
84. Question
Which of the following is the BEST way to maintain ongoing senior management support for the implementation of a security monitoring toot?
CorrectIncorrect -
Question 85 of 150
85. Question
Which of the following would BEST support a business case to implement an anti-ransomware solution?
CorrectIncorrect -
Question 86 of 150
86. Question
When responding to an incident involving malware on a server, which of the following should be done FIRST?
CorrectIncorrect -
Question 87 of 150
87. Question
Which of the following BEST reduces the likelihood of leakage of private information via email?
CorrectIncorrect -
Question 88 of 150
88. Question
Which of the following BEST determines the data retention strategy and subsequent policy for an organization?
CorrectIncorrect -
Question 89 of 150
89. Question
Which of the following MUST be established to maintain an effective information security governance framework?
CorrectIncorrect -
Question 90 of 150
90. Question
Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
CorrectIncorrect -
Question 91 of 150
91. Question
When responding to a security incident, information security management and the affected business unit management cannot agree whether to escalate the incident to senior management. Which of the following would MOST effectively prevent this situation from recurring?
CorrectIncorrect -
Question 92 of 150
92. Question
Which of the following should be done FIRST to ensure information security is integrated in system development projects?
CorrectIncorrect -
Question 93 of 150
93. Question
For which of the following is it MOST important that system administrators be restricted to read-only access?
CorrectIncorrect -
Question 94 of 150
94. Question
Which of the following business units should own the data that populates an identity management system?
CorrectIncorrect -
Question 95 of 150
95. Question
Which of the following BEST indicates senior management support for an information security program?
CorrectIncorrect -
Question 96 of 150
96. Question
When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:
CorrectIncorrect -
Question 97 of 150
97. Question
A business continuity plan (BCP) should contain:
CorrectIncorrect -
Question 98 of 150
98. Question
A finance department director has decided to outsource the organization’s budget application and has identified potential providers. Which of the following actions should be initiated FIRST by the information security manager?
CorrectIncorrect -
Question 99 of 150
99. Question
What type of control is being implemented when a security information and event management (SIEM) system is installed?
CorrectIncorrect -
Question 100 of 150
100. Question
Which of the following should be done FIRST when developing an information asset classification policy?
CorrectIncorrect -
Question 101 of 150
101. Question
Which of the following is the BEST option to lower the cost to implement application security controls?
CorrectIncorrect -
Question 102 of 150
102. Question
Which of the following is the GREATEST benefit of effective information security governance?
CorrectIncorrect -
Question 103 of 150
103. Question
The ability to integrate information security governance into corporate governance is PRIMARILY driven by:
CorrectIncorrect -
Question 104 of 150
104. Question
Which of the following presents the GREATEST challenge for protecting Internet of Things (IoT) devices?
CorrectIncorrect -
Question 105 of 150
105. Question
Which of the following parameters is MOST helpful when designing a disaster recovery strategy?
CorrectIncorrect -
Question 106 of 150
106. Question
An IT service desk was not adequately prepared for a recent ransomware attack on user workstations. Which of the following should be given HIGHEST priority by the information security team when creating an action plan to improve service desk readiness?
CorrectIncorrect -
Question 107 of 150
107. Question
After a risk has been identified, analyzed, and evaluated, which of the following should be done NEXT?
CorrectIncorrect -
Question 108 of 150
108. Question
Which of the following will BEST facilitate timely and effective incident response?
CorrectIncorrect -
Question 109 of 150
109. Question
Which of the following MOST effectively communicates the current risk profile to senior management after controls are applied?
CorrectIncorrect -
Question 110 of 150
110. Question
Which of the following processes should be done NEXT after completing a business impact analysis (BIA)?
CorrectIncorrect -
Question 111 of 150
111. Question
Which of the following is MOST important to include in an information security policy?
CorrectIncorrect -
Question 112 of 150
112. Question
Which of the following should an information security manager do FIRST when creating an organization’s disaster recovery plan (DRP)?
CorrectIncorrect -
Question 113 of 150
113. Question
Which of the following would be the MOST effective use of findings from a post-incident review?
CorrectIncorrect -
Question 114 of 150
114. Question
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
CorrectIncorrect -
Question 115 of 150
115. Question
Which of the following is MOST helpful in determining the realization of benefits from an information security program?
CorrectIncorrect -
Question 116 of 150
116. Question
During an internal compliance review, the review team discovers that a critical legacy application is unable to meet the organization’s mandatory security requirements. Which of the following should be done FIRST?
CorrectIncorrect -
Question 117 of 150
117. Question
Which of the following is the BEST way to improve an organization’s ability to detect and respond to incidents?
CorrectIncorrect -
Question 118 of 150
118. Question
Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?
CorrectIncorrect -
Question 119 of 150
119. Question
Which of the following is the PRIMARY role of the information security manager in application development?
CorrectIncorrect -
Question 120 of 150
120. Question
Which of the following actions by senior management would BEST enable a successful implementation of an information security governance framework?
CorrectIncorrect -
Question 121 of 150
121. Question
Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
CorrectIncorrect -
Question 122 of 150
122. Question
Which of the following is the PRIMARY benefit of an information security awareness training program?
CorrectIncorrect -
Question 123 of 150
123. Question
Which of the following MOST effectively supports an organization’s security culture?
CorrectIncorrect -
Question 124 of 150
124. Question
A new type of ransomware has infected an organization’s network. Which of the following would have BEST enabled the organization to detect this situation?
CorrectIncorrect -
Question 125 of 150
125. Question
Which of the following should an information security manager do FIRST upon notification of a potential security risk associated with a third-party service provider?
CorrectIncorrect -
Question 126 of 150
126. Question
A security incident has been reported within an organization. When should an information security manager contact the information owner?
CorrectIncorrect -
Question 127 of 150
127. Question
An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?
CorrectIncorrect -
Question 128 of 150
128. Question
Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?
CorrectIncorrect -
Question 129 of 150
129. Question
Which of the following information security practices would BEST prevent a SQL injection attack?
CorrectIncorrect -
Question 130 of 150
130. Question
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
CorrectIncorrect -
Question 131 of 150
131. Question
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
CorrectIncorrect -
Question 132 of 150
132. Question
Which of the following is MOST important to include in a post-incident report?
CorrectIncorrect -
Question 133 of 150
133. Question
When creating an incident response plan, the triggers for the business continuity plan (BCP) MUST be based on:
CorrectIncorrect -
Question 134 of 150
134. Question
An organization’s information security strategy should be the PRIMARY input to which of the following?
CorrectIncorrect -
Question 135 of 150
135. Question
Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
CorrectIncorrect -
Question 136 of 150
136. Question
Which of the following is BEST used to determine the maturity of an information security program?
CorrectIncorrect -
Question 137 of 150
137. Question
Which of the following should be done FIRST when developing an information security strategy that is aligned with organizational goals?
CorrectIncorrect -
Question 138 of 150
138. Question
A business impact analysis (BIA) BEST enables an organization to establish:
CorrectIncorrect -
Question 139 of 150
139. Question
Which of the following is the PRIMARY objective of developing an information security program that aligns with the information security strategy?
CorrectIncorrect -
Question 140 of 150
140. Question
Which of the following is MOST important to include in an information security framework?
CorrectIncorrect -
Question 141 of 150
141. Question
An organization learns that a service provider experienced a breach last month and did not notify the organization. Which of the following should be the information security manager’s FIRST course of action?
CorrectIncorrect -
Question 142 of 150
142. Question
Which of the following approaches to communication with senior management BEST enables an information security manager to maximize the effectiveness of the information security program?
CorrectIncorrect -
Question 143 of 150
143. Question
Which of the following control types should be considered FIRST for aligning employee behavior with an organization’s information security objectives?
CorrectIncorrect -
Question 144 of 150
144. Question
An organization’s information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?
CorrectIncorrect -
Question 145 of 150
145. Question
Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?
CorrectIncorrect -
Question 146 of 150
146. Question
Which of the following should the information security manager do FIRST upon learning that a business department wants to use blockchain technology for a new payment process?
CorrectIncorrect -
Question 147 of 150
147. Question
Which of the following BEST facilitates the development of information security procedures that effectively support the information security policy?
CorrectIncorrect -
Question 148 of 150
148. Question
Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?
CorrectIncorrect -
Question 149 of 150
149. Question
Which of the following is MOST helpful for determining priorities when creating a long-term information security roadmap?
CorrectIncorrect -
Question 150 of 150
150. Question
A KEY consideration in the use of quantitative risk analysis is that it:
CorrectIncorrect