CISM Final Assessment 5
Quiz Summary
0 of 51 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 51 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 51
1. Question
Which of the following is the MOST important objective when planning an incident response program?
CorrectIncorrect -
Question 2 of 51
2. Question
Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
CorrectIncorrect -
Question 3 of 51
3. Question
A financial institution is planning to develop a new mobile application. Which of the following is the BEST time to begin assessments of the application’s security compliance?
CorrectIncorrect -
Question 4 of 51
4. Question
When considering a new security initiative, which of the following should be done prior to the development of a business case?
CorrectIncorrect -
Question 5 of 51
5. Question
Which of the following BEST demonstrates the potential for successful business continuity in the event of a disaster?
CorrectIncorrect -
Question 6 of 51
6. Question
Which of the following is an essential practice for workstations used to conduct a forensic investigation?
CorrectIncorrect -
Question 7 of 51
7. Question
Which of the following components of the risk assessment process should be reviewed FIRST to gain an understanding of the scope of an emerging risk within an organization?
CorrectIncorrect -
Question 8 of 51
8. Question
An information security manager has been tasked with implementing a security solution that provides insight into potential security incidents Which of the following BEST supports this activity?
CorrectIncorrect -
Question 9 of 51
9. Question
Which of the following is MOST important for the information security manager to confirm when reviewing an incident response plan?
CorrectIncorrect -
Question 10 of 51
10. Question
Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
CorrectIncorrect -
Question 11 of 51
11. Question
Exceptions to a security policy should be approved based PRIMARILY on:
CorrectIncorrect -
Question 12 of 51
12. Question
When developing a business case for a new security initiative, an information security manager should FIRST:
CorrectIncorrect -
Question 13 of 51
13. Question
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
CorrectIncorrect -
Question 14 of 51
14. Question
Which of the following is MOST important for an information security steering committee to ensure?
CorrectIncorrect -
Question 15 of 51
15. Question
An organization experienced a breach which was successfully contained and remediated. Based on industry regulations, the breach needs to be communicated externally. What should the information security manager do NEXT?
CorrectIncorrect -
Question 16 of 51
16. Question
Which of the following is the BEST defense against a brute force attack?
CorrectIncorrect -
Question 17 of 51
17. Question
Which of the following is MOST important to verify during a test of an organization’s incident response process?
CorrectIncorrect -
Question 18 of 51
18. Question
An intrusion prevention system (IPS) has reported a significant increase in the number of hacking attempts over the past month, though no systems have actually been compromised. Which of the following should the information security manager do FIRST?
CorrectIncorrect -
Question 19 of 51
19. Question
The likelihood of a successful intrusion is a function of:
CorrectIncorrect -
Question 20 of 51
20. Question
Which of the following is the BEST evidence that senior management supports the information security program?
CorrectIncorrect -
Question 21 of 51
21. Question
During incident recovery, which of the following is the BEST approach to ensure the eradication of traces hidden by an attacker?
CorrectIncorrect -
Question 22 of 51
22. Question
Which of the following BEST enables the effectiveness of an information security training program for new employees?
CorrectIncorrect -
Question 23 of 51
23. Question
An information security manager has learned of an increasing trend in attacks that use phishing emails impersonating an organization’s CEO in an attempt to commit wire transfer fraud. Which of the following is the BEST way to reduce the risk associated with this type of attack?
CorrectIncorrect -
Question 24 of 51
24. Question
Which of the following is the BEST indication of effective information security governance?
CorrectIncorrect -
Question 25 of 51
25. Question
A data loss prevention (DLP) tool has flagged personally identifiable information (PII) during transmission. Which of the following should the information security manager do FIRST?
CorrectIncorrect -
Question 26 of 51
26. Question
Which of the following is MOST likely to require an organization to update its business continuity plan (BCP)?
CorrectIncorrect -
Question 27 of 51
27. Question
Which of the following is the GREATEST benefit of performing a tabletop exercise of the business continuity plan (BCP)?
CorrectIncorrect -
Question 28 of 51
28. Question
Which of the following is the BEST approach for encouraging business units to assume their roles and responsibilities in an information security program?
CorrectIncorrect -
Question 29 of 51
29. Question
Which of the following is MOST influential in driving the effectiveness of an information security program?
CorrectIncorrect -
Question 30 of 51
30. Question
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
CorrectIncorrect -
Question 31 of 51
31. Question
Which of the following is the GREATEST risk associated with a poorly trained incident response team responding to a major incident?
CorrectIncorrect -
Question 32 of 51
32. Question
Which of the following is the PRIMARY preventive method to mitigate risks associated with privileged accounts?
CorrectIncorrect -
Question 33 of 51
33. Question
Which of the following BEST enables an incident response team to determine appropriate actions during an initial investigation?
CorrectIncorrect -
Question 34 of 51
34. Question
An organization’s service desk has reported that a PC is displaying a message with the phrase “your personal files are encrypted.” Which of the following should be done FIRST?
CorrectIncorrect -
Question 35 of 51
35. Question
When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:
CorrectIncorrect -
Question 36 of 51
36. Question
Which of the following groups is MOST important to involve in the development of information security procedures?
CorrectIncorrect -
Question 37 of 51
37. Question
Which of the following would be MOST useful to determine the current status of an information security program’s maturity level?
CorrectIncorrect -
Question 38 of 51
38. Question
The MOST significant outcome obtained from conducting a business impact analysis (BIA) is improved:
CorrectIncorrect -
Question 39 of 51
39. Question
Which of the following BEST indicates ongoing senior management commitment to the organization’s information security strategy?
CorrectIncorrect -
Question 40 of 51
40. Question
Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?
CorrectIncorrect -
Question 41 of 51
41. Question
Which of the following is the MOST important objective when recommending controls?
CorrectIncorrect -
Question 42 of 51
42. Question
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
CorrectIncorrect -
Question 43 of 51
43. Question
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager’s FIRST course of action should be to:
CorrectIncorrect -
Question 44 of 51
44. Question
Which of the following is a PRIMARY responsibility of a data owner?
CorrectIncorrect -
Question 45 of 51
45. Question
Which of the following is MOST helpful for retaining the support of executive management for an information security program?
CorrectIncorrect -
Question 46 of 51
46. Question
When performing a business impact analysis (BIA), which of the following is the MOST important reason to determine the maximum tolerable downtime (MTD)?
CorrectIncorrect -
Question 47 of 51
47. Question
Which of the following processes should remain internal when outsourcing IT operations?
CorrectIncorrect -
Question 48 of 51
48. Question
An organization plans to adopt a DevOps approach for innovative application development. Which of the following should be the information security manager’s MOST important consideration with regard to the information security strategy?
CorrectIncorrect -
Question 49 of 51
49. Question
Which of the following is the MOST important reason to integrate nonrepudiation into the design of user authentication?
CorrectIncorrect -
Question 50 of 51
50. Question
A significant risk was identified within a core business function. Budget constraints do not allow for effective remediation. Who should be accountable for selecting the appropriate risk treatment?
CorrectIncorrect -
Question 51 of 51
51. Question
An information security manager is building a business case to support an investment in a next generation firewall. Which of the following would BEST maximize the effectiveness of the business case?
CorrectIncorrect