CISM Final Assessment 4
Quiz Summary
0 of 150 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 150 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 150
1. Question
A situation where an organization has unpatched IT systems in violation of the patching policy should be treated as:
CorrectIncorrect -
Question 2 of 150
2. Question
How does data discovery assist with data classification?
CorrectIncorrect -
Question 3 of 150
3. Question
Which of the following is the MOST effective control to prevent proliferation of shadow IT?
CorrectIncorrect -
Question 4 of 150
4. Question
Which of the following is the MOST important driver when developing an effective information security strategy?
CorrectIncorrect -
Question 5 of 150
5. Question
Which of the following is MOST important for the improvement of a business continuity plan (BCP)?
CorrectIncorrect -
Question 6 of 150
6. Question
Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?
CorrectIncorrect -
Question 7 of 150
7. Question
A financial institution has identified a high risk of fraud within its credit department. Which of the following information security controls will BEST reduce the risk of fraud?
CorrectIncorrect -
Question 8 of 150
8. Question
An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
CorrectIncorrect -
Question 9 of 150
9. Question
The business value of an information asset is derived from:
CorrectIncorrect -
Question 10 of 150
10. Question
Which of the following is the BEST indicator of the maturity level of a vendor risk management process?
CorrectIncorrect -
Question 11 of 150
11. Question
An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager’s MAIN concern?
CorrectIncorrect -
Question 12 of 150
12. Question
Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?
CorrectIncorrect -
Question 13 of 150
13. Question
Which of the following is MOST important when developing an information security governance framework?
CorrectIncorrect -
Question 14 of 150
14. Question
What should be an information security manager’s GREATEST concern when an HR department outsources data processing to a cloud service provider?
CorrectIncorrect -
Question 15 of 150
15. Question
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
CorrectIncorrect -
Question 16 of 150
16. Question
Which of the following BEST determines an information asset’s classification?
CorrectIncorrect -
Question 17 of 150
17. Question
Which of the following is the PRIMARY objective of a cyber resilience strategy?
CorrectIncorrect -
Question 18 of 150
18. Question
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
CorrectIncorrect -
Question 19 of 150
19. Question
Which of the following is the BEST indication that an information security control is no longer relevant?
CorrectIncorrect -
Question 20 of 150
20. Question
Which of the following is the PRIMARY advantage of an organization using Disaster Recovery as a Service (DRaaS) to help manage its disaster recovery program?
CorrectIncorrect -
Question 21 of 150
21. Question
Which of the following is the MOST important outcome of a post-incident review?
CorrectIncorrect -
Question 22 of 150
22. Question
Which of the following is the BEST indicator of the performance of a security program?
CorrectIncorrect -
Question 23 of 150
23. Question
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
CorrectIncorrect -
Question 24 of 150
24. Question
Which of the following BEST facilitates the development of a comprehensive information security policy?
CorrectIncorrect -
Question 25 of 150
25. Question
Which of the following is the MOST effective way to demonstrate improvement in security performance?
CorrectIncorrect -
Question 26 of 150
26. Question
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
CorrectIncorrect -
Question 27 of 150
27. Question
Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
CorrectIncorrect -
Question 28 of 150
28. Question
Which of the following would be MOST useful when determining the business continuity strategy for a large organization’s data center?
CorrectIncorrect -
Question 29 of 150
29. Question
The results of a risk assessment for a potential network reconfiguration reveal a high likelihood of sensitive data being compromised. What is the information security manager’s BEST course of action?
CorrectIncorrect -
Question 30 of 150
30. Question
Who should be included in INITIAL discussions regarding a failed security control?
CorrectIncorrect -
Question 31 of 150
31. Question
An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?
CorrectIncorrect -
Question 32 of 150
32. Question
Which of the following should an information security manager do FIRST upon learning of a new ransomware targeting a particular line of business?
CorrectIncorrect -
Question 33 of 150
33. Question
Which of the following should be the PRIMARY objective when establishing a new information security program?
CorrectIncorrect -
Question 34 of 150
34. Question
An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?
CorrectIncorrect -
Question 35 of 150
35. Question
Which of the following is the BEST defense against distributed denial of service (DDoS) attacks?
CorrectIncorrect -
Question 36 of 150
36. Question
Which of the following scenarios would MOST likely require a change to corporate security policies?
CorrectIncorrect -
Question 37 of 150
37. Question
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
CorrectIncorrect -
Question 38 of 150
38. Question
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?
CorrectIncorrect -
Question 39 of 150
39. Question
Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?
CorrectIncorrect -
Question 40 of 150
40. Question
Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?
CorrectIncorrect -
Question 41 of 150
41. Question
When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:
CorrectIncorrect -
Question 42 of 150
42. Question
Which of the following controls would BEST help to detect a targeted attack exploiting a zero-day vulnerability?
CorrectIncorrect -
Question 43 of 150
43. Question
Which of the following is the MOST relevant control to address the integrity of information?
CorrectIncorrect -
Question 44 of 150
44. Question
What should be the PRIMARY objective of an information classification scheme?
CorrectIncorrect -
Question 45 of 150
45. Question
Which of the following is MOST important to consider when prioritizing threats during the risk assessment process?
CorrectIncorrect -
Question 46 of 150
46. Question
Which of the following would BEST fulfill a board of directors’ request for a concise overview of information security risk facing the business?
CorrectIncorrect -
Question 47 of 150
47. Question
Which of the following is the PRIMARY purpose of a business impact analysis (BIA)?
CorrectIncorrect -
Question 48 of 150
48. Question
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
CorrectIncorrect -
Question 49 of 150
49. Question
Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
CorrectIncorrect -
Question 50 of 150
50. Question
Which of the following is MOST important for effective cybersecurity incident management?
CorrectIncorrect -
Question 51 of 150
51. Question
An organization uses a security standard that has undergone a major revision by the certifying authority. The old version of the standard will no longer be used for organizations wishing to maintain their certifications. Which of the following should be the FIRST course of action?
CorrectIncorrect -
Question 52 of 150
52. Question
Which of the following is the MOST appropriate metric to demonstrate the effectiveness of information security controls to senior management?
CorrectIncorrect -
Question 53 of 150
53. Question
Which of the following is the BEST indication that an organization has integrated information security governance with corporate governance?
CorrectIncorrect -
Question 54 of 150
54. Question
The MOST effective way to present information security risk to senior management is to highlight:
CorrectIncorrect -
Question 55 of 150
55. Question
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of confidentiality?
CorrectIncorrect -
Question 56 of 150
56. Question
Which of the following should be the PRIMARY objective for creating a culture of security within an organization?
CorrectIncorrect -
Question 57 of 150
57. Question
Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?
CorrectIncorrect -
Question 58 of 150
58. Question
Which of the following is the MOST effective way to ensure the security of services and solutions delivered by third-party vendors?
CorrectIncorrect -
Question 59 of 150
59. Question
Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?
CorrectIncorrect -
Question 60 of 150
60. Question
Which of the following is MOST important for guiding the development and management of a comprehensive information security program?
CorrectIncorrect -
Question 61 of 150
61. Question
Which of the following is the BEST way to ensure data is not co-mingled or exposed when using a cloud service provider?
CorrectIncorrect -
Question 62 of 150
62. Question
Before approving the implementation of a new security solution, senior management requires a business case. Which of the following would BEST support the justification for investment?
CorrectIncorrect -
Question 63 of 150
63. Question
When an organization implements an information security governance framework, it is MOST important for executive leadership to have a direct role in:
CorrectIncorrect -
Question 64 of 150
64. Question
Which of the following should have the MOST influence on an organization’s response to a new industry regulation?
CorrectIncorrect -
Question 65 of 150
65. Question
Biometrics are BEST used for:
CorrectIncorrect -
Question 66 of 150
66. Question
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
CorrectIncorrect -
Question 67 of 150
67. Question
Communicating which of the following would be MOST helpful to gain senior management support for risk treatment options?
CorrectIncorrect -
Question 68 of 150
68. Question
Which of the following is the PRIMARY objective of information asset classification?
CorrectIncorrect -
Question 69 of 150
69. Question
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization’s intrusion detection systems (IDSs)?
CorrectIncorrect -
Question 70 of 150
70. Question
Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (IaaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?
CorrectIncorrect -
Question 71 of 150
71. Question
Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?
CorrectIncorrect -
Question 72 of 150
72. Question
Which of the following will have the GREATEST impact on the development of the information classification scheme consisting of various classification levels?
CorrectIncorrect -
Question 73 of 150
73. Question
To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:
CorrectIncorrect -
Question 74 of 150
74. Question
Of the following, who should own the risk associated with unauthorized access to application data?
CorrectIncorrect -
Question 75 of 150
75. Question
The categorization of incidents is MOST important for evaluating which of the following?
CorrectIncorrect -
Question 76 of 150
76. Question
An organization learns that a third party has outsourced critical functions to another external provider. Which of the following is the information security manager’s MOST important course of action?
CorrectIncorrect -
Question 77 of 150
77. Question
An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?
CorrectIncorrect -
Question 78 of 150
78. Question
The PRIMARY benefit of using http secure (https) is that it provides:
CorrectIncorrect -
Question 79 of 150
79. Question
An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?
CorrectIncorrect -
Question 80 of 150
80. Question
To improve an organization’s information security culture, it is MOST important for senior management to:
CorrectIncorrect -
Question 81 of 150
81. Question
Which of the following BEST illustrates residual risk within an organization?
CorrectIncorrect -
Question 82 of 150
82. Question
Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?
CorrectIncorrect -
Question 83 of 150
83. Question
An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?
CorrectIncorrect -
Question 84 of 150
84. Question
Which of the following is the MOST important success factor when developing an information security strategy?
CorrectIncorrect -
Question 85 of 150
85. Question
Which of the following BEST demonstrates a security-conscious organizational culture?
CorrectIncorrect -
Question 86 of 150
86. Question
Which of the following is the MOST effective data loss control when connecting a personally owned mobile device to the corporate email system?
CorrectIncorrect -
Question 87 of 150
87. Question
Which of the following should be the FIRST step when performing triage of a malware incident?
CorrectIncorrect -
Question 88 of 150
88. Question
Which of the following BEST helps to enable the desired information security culture within an organization?
CorrectIncorrect -
Question 89 of 150
89. Question
Which of the following should be the GREATEST concern for an information security manager when an annual audit reveals the organization’s business continuity plan (BCP) has not been reviewed or updated in more than a year?
CorrectIncorrect -
Question 90 of 150
90. Question
Which of the following is the MOST important goal of an information security program?
CorrectIncorrect -
Question 91 of 150
91. Question
Which of the following BEST helps to ensure the effective execution of an organization’s disaster recovery plan (DRP)?
CorrectIncorrect -
Question 92 of 150
92. Question
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
CorrectIncorrect -
Question 93 of 150
93. Question
The PRIMARY reason for senior management to monitor information security metrics is to ensure:
CorrectIncorrect -
Question 94 of 150
94. Question
Which of the following is the MOST important reason to perform a privacy impact assessment?
CorrectIncorrect -
Question 95 of 150
95. Question
When reporting information security risk to senior management, it is MOST important to include:
CorrectIncorrect -
Question 96 of 150
96. Question
Which of the following is MOST likely to improve an organization’s security culture?
CorrectIncorrect -
Question 97 of 150
97. Question
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
CorrectIncorrect -
Question 98 of 150
98. Question
What is the BEST way for an information security manager to improve the effectiveness of risk management in an organization that currently manages risk at the departmental level?
CorrectIncorrect -
Question 99 of 150
99. Question
Which of the following is MOST helpful to an information security manager when determining service level requirements for an outsourced application?
CorrectIncorrect -
Question 100 of 150
100. Question
Which of the following is MOST important to consider when planning the eradication of a cyberattack?
CorrectIncorrect -
Question 101 of 150
101. Question
Which of the following BEST enables an information security manager to identify changes in the threat landscape due to emerging technologies?
CorrectIncorrect -
Question 102 of 150
102. Question
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
CorrectIncorrect -
Question 103 of 150
103. Question
The resilience requirements of an application are BEST determined by:
CorrectIncorrect -
Question 104 of 150
104. Question
Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
CorrectIncorrect -
Question 105 of 150
105. Question
Which of the following is MOST important to the successful implementation of a new information security program?
CorrectIncorrect -
Question 106 of 150
106. Question
An information security team has confirmed that threat actors are taking advantage of a newly announced critical vulnerability within an application. Which of the following should be done FIRST?
CorrectIncorrect -
Question 107 of 150
107. Question
Which of the following is the MOST important consideration when evaluating the performance of existing security controls?
CorrectIncorrect -
Question 108 of 150
108. Question
Which of the following metrics BEST demonstrates the effectiveness of an organization’s security awareness program?
CorrectIncorrect -
Question 109 of 150
109. Question
Who should decide whether a specific control should be changed once risk is approved for mitigation?
CorrectIncorrect -
Question 110 of 150
110. Question
When determining key risk indicators (KRIs) for use in an information security program it is MOST important to select:
CorrectIncorrect -
Question 111 of 150
111. Question
Senior management has requested a budget cut for the information security program in the coming fiscal year. Which of the following should be the information security manager’s FIRST course of action?
CorrectIncorrect -
Question 112 of 150
112. Question
What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?
CorrectIncorrect -
Question 113 of 150
113. Question
Which of the following presents the GREATEST challenge when assessing the impact of emerging risk?
CorrectIncorrect -
Question 114 of 150
114. Question
To effectively manage an organization’s information security risk, it is MOST important to:
CorrectIncorrect -
Question 115 of 150
115. Question
Which of the following is the MOST useful input for an information security manager when updating the organization’s security policy?
CorrectIncorrect -
Question 116 of 150
116. Question
The MOST effective way for an information security manager to secure senior management support for the information security strategy is by:
CorrectIncorrect -
Question 117 of 150
117. Question
When engaging an external party to perform a penetration test, it is MOST important to:
CorrectIncorrect -
Question 118 of 150
118. Question
Which of the following is the MOST effective way to convey information security responsibilities across an organization?
CorrectIncorrect -
Question 119 of 150
119. Question
A financial institution is expanding to international jurisdictions and is mindful of protecting customer information. Which of the following should be of GREATEST concern?
CorrectIncorrect -
Question 120 of 150
120. Question
When evaluating cloud storage solutions, the FIRST consideration should be:
CorrectIncorrect -
Question 121 of 150
121. Question
Which of the following is the GREATEST benefit resulting from the introduction of data security standards for payment cards?
CorrectIncorrect -
Question 122 of 150
122. Question
Which of the following should an information security manager establish FIRST to ensure security-related activities are adequately monitored?
CorrectIncorrect -
Question 123 of 150
123. Question
Which of the following is the BEST approach for data owners to use when defining access privileges for users?
CorrectIncorrect -
Question 124 of 150
124. Question
Which of the following is the BEST control to protect customer personal information that is stored in the cloud?
CorrectIncorrect -
Question 125 of 150
125. Question
Which of the following is MOST important to include in an enterprise information security policy?
CorrectIncorrect -
Question 126 of 150
126. Question
An information security manager wants to upgrade an organization’s workstations to a new operating system version. Which of the following would be MOST helpful to gain senior management support for the upgrade?
CorrectIncorrect -
Question 127 of 150
127. Question
Which of the following is MOST important to define when creating information security management metrics?
CorrectIncorrect -
Question 128 of 150
128. Question
A PRIMARY benefit of adopting an information security framework is that it provides:
CorrectIncorrect -
Question 129 of 150
129. Question
It is MOST important that risk owners understand they are accountable for:
CorrectIncorrect -
Question 130 of 150
130. Question
Which of the following is MOST important to include in security incident escalation procedures?
CorrectIncorrect -
Question 131 of 150
131. Question
An organization has implemented a new email filter to mitigate risk associated with its email system. Who is BEST suited to be the control owner?
CorrectIncorrect -
Question 132 of 150
132. Question
When introducing a new information asset, what is the MOST important responsibility of the asset owner?
CorrectIncorrect -
Question 133 of 150
133. Question
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
CorrectIncorrect -
Question 134 of 150
134. Question
When updating the information security policy to accommodate a new regulation, the information security manager should FIRST:
CorrectIncorrect -
Question 135 of 150
135. Question
Which of the following is the BEST way to align security and business strategies?
CorrectIncorrect -
Question 136 of 150
136. Question
Which of the following should an information security manager do FIRST when developing a security framework?
CorrectIncorrect -
Question 137 of 150
137. Question
A Software as a Service (SaaS) application has been implemented to support a critical business process. Which of the following is MOST important to include within the service level agreement (SLA) to ensure timely response to incidents affecting the application?
CorrectIncorrect -
Question 138 of 150
138. Question
Of the following, who is BEST positioned to perform a business impact analysis (BIA)?
CorrectIncorrect -
Question 139 of 150
139. Question
Which of the following is the BEST indication of an effective disaster recovery planning process?
CorrectIncorrect -
Question 140 of 150
140. Question
Which of the following provides the BEST input to determine the level of protection needed for an IT system?
CorrectIncorrect -
Question 141 of 150
141. Question
Which of the following should be the FIRST consideration for an information security manager after a security incident has been confirmed?
CorrectIncorrect -
Question 142 of 150
142. Question
Which of the following actions will BEST resolve the root cause of a cyber incident involving unauthorized network access due to a critical vulnerability on a web server?
CorrectIncorrect -
Question 143 of 150
143. Question
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
CorrectIncorrect -
Question 144 of 150
144. Question
Which of the following is an information security manager’s MOST important action during the third-party provider selection process?
CorrectIncorrect -
Question 145 of 150
145. Question
Which of the following risk assessment findings for an online-only business should be given the HIGHEST priority to address availability concerns?
CorrectIncorrect -
Question 146 of 150
146. Question
At which stage of business continuity planning is risk identification performed?
CorrectIncorrect -
Question 147 of 150
147. Question
An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager’s BEST course of action?
CorrectIncorrect -
Question 148 of 150
148. Question
Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise’s security management framework?
CorrectIncorrect -
Question 149 of 150
149. Question
Which of the following is MOST important for an information security manager to consider when determining whether data should be stored?
CorrectIncorrect -
Question 150 of 150
150. Question
A business unit recently integrated the organization’s new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager’s BEST course of action to address this situation?
CorrectIncorrect