Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CISM Questions and Answers

Question # 6

Data classification is PRIMARILY the responsibility of:

A.

senior management.

B.

the data custodian.

C.

the data owner.

D.

the security manager.

Full Access
Question # 7

A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?

A.

Ensure a risk assessment is performed to evaluate the findings

B.

Ensure vulnerabilities found are resolved within acceptable timeframes

C.

Request funding needed to resolve the top vulnerabilities

D.

Report findings to senior management

Full Access
Question # 8

Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?

A.

Availability of web application firewall logs.

B.

Capability of online virtual machine analysis

C.

Availability of current infrastructure documentation

D.

Capability to take a snapshot of virtual machines

Full Access
Question # 9

Which risk is introduced when using only sanitized data for the testing of applications?

A.

Data loss may occur during the testing phase.

B.

Data disclosure may occur during the migration event

C.

Unexpected outcomes may arise in production

D.

Breaches of compliance obligations will occur.

Full Access
Question # 10

Which of the following is the GREATEST benefit of information asset classification?

A.

Helping to determine the recovery point objective (RPO)

B.

Providing a basis for implementing a need-to-know policy

C.

Supporting segregation of duties

D.

Defining resource ownership

Full Access
Question # 11

Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?

A.

Monitor the effectiveness of controls

B.

Update the risk assessment framework

C.

Review the inherent risk level

D.

Review the risk probability and impact

Full Access
Question # 12

Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?

A.

Reliable image backups

B.

Impact assessment

C.

Documented eradication procedures

D.

Root cause analysis

Full Access
Question # 13

The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:

A.

)the information security officer.

B.

the steering committee.

C.

the board of directors.

D.

the internal audit manager.

Full Access
Question # 14

What is the PRIMARY objective of performing a vulnerability assessment following a business system update?

A.

Determine operational losses.

B.

Improve the change control process.

C.

Update the threat landscape.

D.

Review the effectiveness of controls

Full Access
Question # 15

Which of the following is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?

A.

Poor documentation of results and lessons learned

B.

Lack of communication to affected users

C.

Disruption to the production environment

D.

Lack of coordination among departments

Full Access
Question # 16

An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?

A.

Install the OS, patches, and application from the original source.

B.

Restore the OS, patches, and application from a backup.

C.

Restore the application and data from a forensic copy.

D.

Remove all signs of the intrusion from the OS and application.

Full Access
Question # 17

The PRIMARY goal to a post-incident review should be to:

A.

identify policy changes to prevent a recurrence.

B.

determine how to improve the incident handling process.

C.

establish the cost of the incident to the business.

D.

determine why the incident occurred.

Full Access
Question # 18

A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?

A.

Conduct automated scans on applications before deployment.

B.

Supplement existing development teams with security engineers.

C.

Integrate information security into existing change management.

D.

Create a new governance council for application security.

Full Access
Question # 19

Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?

A.

Host patching

B.

Penetration testing

C.

Infrastructure hardening

D.

Data classification

Full Access
Question # 20

An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.

Which of the following should be given immediate focus?

A.

Moving to a zero trust access model

B.

Enabling network-level authentication

C.

Enhancing cyber response capability

D.

Strengthening endpoint security

Full Access
Question # 21

Information security policies should PRIMARILY reflect alignment with:

A.

an information security framework.

B.

industry best practices.

C.

data security standards.

D.

senior management intent.

Full Access
Question # 22

Which of the following is MOST important for the successful implementation of an incident response plan?

A.

Ensuring response staff are appropriately trained

B.

Developing metrics for incident response reporting

C.

Establishing an escalation process for the help desk

D.

Developing a RACI chart of response staff functions

Full Access
Question # 23

Which of the following should be the FIRST step when performing triage of a malware incident?

A.

Containing the affected system

B.

Preserving the forensic image

C.

Comparing backup against production

D.

Removing the malware

Full Access
Question # 24

An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?

A.

Perform a business impact analysis (BIA).

B.

Notify local law enforcement agencies of a breach.

C.

Activate the incident response program.

D.

Validate the risk to the organization.

Full Access
Question # 25

Which of the following is MOST important to the successful implementation of an information security program?

A.

Adequate security resources are allocated to the program.

B.

Key performance indicators (KPIs) are defined.

C.

A balanced scorecard is approved by the steering committee.

D.

The program is developed using global security standards.

Full Access
Question # 26

An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?

A.

Immediately suspend the executives' access privileges.

B.

Notify the CISO of the security policy violation.

C.

Perform a full review of all system transactions over the past 90 days.

D.

Perform a system access review.

Full Access
Question # 27

Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?

A.

Storing the plan at an offsite location

B.

Communicating the plan to all stakeholders

C.

Updating the plan periodically

D.

Conducting a walk-through of the plan

Full Access
Question # 28

Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?

A.

Place the web server in quarantine.

B.

Rebuild the server from the last verified backup.

C.

Shut down the server in an organized manner.

D.

Rebuild the server with relevant patches from the original media.

Full Access
Question # 29

Which of the following parties should be responsible for determining access levels to an application that processes client information?

A.

The business client

B.

The information security tear

C.

The identity and access management team

D.

Business unit management

Full Access
Question # 30

Which of the following is the BEST indicator of an organization's information security status?

A.

Intrusion detection log analysis

B.

Controls audit

C.

Threat analysis

D.

Penetration test

Full Access
Question # 31

Which of the following is MOST important for an information security manager to verify when selecting a third-party forensics provider?

A.

Existence of a right-to-audit clause

B.

Results of the provider's business continuity tests

C.

Technical capabilities of the provider

D.

Existence of the provider's incident response plan

Full Access
Question # 32

From an information security perspective, legal issues associated with a transborder flow of technology-related items are MOST often

A.

website transactions and taxation.

B.

software patches and corporate date.

C.

encryption tools and personal data.

D.

lack of competition and free trade.

Full Access
Question # 33

Which of the following is the BEST indicator of an emerging incident?

A.

A weakness identified within an organization's information systems

B.

Customer complaints about lack of website availability

C.

A recent security incident at an industry competitor

D.

Attempted patching of systems resulting in errors

Full Access
Question # 34

Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?

A.

Conduct a business impact analysis (BIA).

B.

Conduct periodic awareness training.

C.

Perform a security gap analysis.

D.

Perform network penetration testing.

Full Access
Question # 35

Which of the following is the PRIMARY reason to use a phased incident recovery approach?

A.

To gain management buy-in

B.

To give the response team time to analyze incidents

C.

To ensure critical systems are recovered first

D.

To prioritize remediation steps

Full Access
Question # 36

Labeling information according to its security classification:

A.

enhances the likelihood of people handling information securely.

B.

reduces the number and type of countermeasures required.

C.

reduces the need to identify baseline controls for each classification.

D.

affects the consequences if information is handled insecurely.

Full Access
Question # 37

Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.

Which of the following should be the PRIMARY focus of Company A's information security manager?

A.

The organizational structure of Company B

B.

The cost to align to Company A's security policies

C.

Company A's security architecture

D.

Company B's security policies

Full Access
Question # 38

The information security manager of a multinational organization has been asked to consolidate the information security policies of its regional locations. Which of the following would be of

GREATEST concern?

A.

Varying threat environments

B.

Disparate reporting lines

C.

Conflicting legal requirements

D.

Differences in work culture

Full Access
Question # 39

During which of the following development phases is it MOST challenging to implement security controls?

A.

Post-implementation phase

B.

Implementation phase

C.

Development phase

D.

Design phase

Full Access
Question # 40

Which of the following BEST enables an organization to effectively manage emerging cyber risk?

A.

Periodic internal and external audits

B.

Clear lines of responsibility

C.

Sufficient cyber budget allocation

D.

Cybersecurity policies

Full Access
Question # 41

Which of the following is the MOST essential element of an information security program?

A.

Benchmarking the program with global standards for relevance

B.

Prioritizing program deliverables based on available resources

C.

Involving functional managers in program development

D.

Applying project management practices used by the business

Full Access
Question # 42

Which of the following is the MOST important factor of a successful information security program?

A.

The program follows industry best practices.

B.

The program is based on a well-developed strategy.

C.

The program is cost-efficient and within budget,

D.

The program is focused on risk management.

Full Access
Question # 43

Which of the following BEST describes a buffer overflow?

A.

A function is carried out with more data than the function can handle

B.

A program contains a hidden and unintended function that presents a security risk

C.

Malicious code designed to interfere with normal operations

D.

A type of covert channel that captures data

Full Access
Question # 44

An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?

A.

No owners were identified for some risks.

B.

Business applications had the highest number of risks.

C.

Risk mitigation action plans had no timelines.

D.

Risk mitigation action plan milestones were delayed.

Full Access
Question # 45

Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?

A.

Threat analytics software

B.

Host intrusion detection system

C.

SIEM

D.

Network intrusion detection system

Full Access
Question # 46

After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?

A.

The service level agreement (SLA) was not met.

B.

The recovery time objective (RTO) was not met.

C.

The root cause was not identified.

D.

Notification to stakeholders was delayed.

Full Access
Question # 47

The PRIMARY reason to properly classify information assets is to determine:

A.

appropriate encryption strength using a risk-based approach.

B.

the business impact if assets are compromised.

C.

the appropriate protection based on sensitivity.

D.

user access levels based on the need to know.

Full Access
Question # 48

Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?

A.

Management's business goals and objectives

B.

Strategies of other non-regulated companies

C.

Risk assessment results

D.

Industry best practices and control recommendations

Full Access
Question # 49

Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?

A.

Escalation processes

B.

Technological capabilities

C.

Recovery time objective (RTO)

D.

Security audit reports

Full Access
Question # 50

Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:

A.

number of impacted users.

B.

capability of incident handlers.

C.

type of confirmed incident.

D.

predicted incident duration.

Full Access
Question # 51

When determining an acceptable risk level which of the following is the MOST important consideration?

A.

Threat profiles

B.

System criticalities

C.

Vulnerability scores

D.

Risk matrices

Full Access
Question # 52

Of the following, who is accountable for data loss in the event of an information security incident at a third-party provider?

A.

The information security manager

B.

The service provider that hosts the data

C.

The incident response team

D.

The business data owner

Full Access
Question # 53

Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?

A.

Providing training from third-party forensics firms

B.

Obtaining industry certifications for the response team

C.

Conducting tabletop exercises appropriate for the organization

D.

Documenting multiple scenarios for the organization and response steps

Full Access
Question # 54

Which of the following is MOST important to ensuring that incident management plans are executed effectively?

A.

Management support and approval has been obtained.

B.

The incident response team has the appropriate training.

C.

An incident response maturity assessment has been conducted.

D.

A reputable managed security services provider has been engaged.

Full Access
Question # 55

An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?

A.

Responsible entities

B.

Key risk indicators (KRIS)

C.

Compensating controls

D.

Potential business impact

Full Access
Question # 56

Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?

A.

Update the vendor risk assessment.

B.

Engage legal counsel.

C.

Renegotiate the vendor contract.

D.

Terminate the relationship with the vendor.

Full Access
Question # 57

Which of the following is the MOST effective way to detect security incidents?

A.

Analyze recent security risk assessments.

B.

Analyze security anomalies.

C.

Analyze penetration test results.

D.

Analyze vulnerability assessments.

Full Access
Question # 58

To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:

A.

isolate the infected systems.

B.

preserve the evidence.

C.

image the infected systems.

D.

clean the malware.

Full Access
Question # 59

Which of the following is MOST important to include in an information security strategy?

A.

Stakeholder requirements

B.

Risk register

C.

Industry benchmarks

D.

Regulatory requirements

Full Access
Question # 60

Which of the following BEST facilitates effective strategic alignment of security initiatives?

A.

The business strategy is periodically updated

B.

Procedures and standards are approved by department heads.

C.

Periodic security audits are conducted by a third-party.

D.

Organizational units contribute to and agree on priorities

Full Access
Question # 61

Which of the following provides the MOST useful information for identifying security control gaps on an application server?

A.

Risk assessments

B.

Threat models

C.

Penetration testing

D.

Internal audit reports

Full Access
Question # 62

Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?

A.

Performing penetration tests against the network to demonstrate business vulnerability

B.

Highlighting competitor performance regarding network best security practices

C.

Demonstrating that targeted security controls tie to business objectives

D.

Presenting comparable security implementation estimates from several vendors

Full Access
Question # 63

Which of the following is MOST important when developing an information security strategy?

A.

Engage stakeholders.

B.

Assign data ownership.

C.

Determine information types.

D.

Classify information assets.

Full Access
Question # 64

Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of

confidentiality?

A.

Ensuring hashing of administrator credentials

B.

Enforcing service level agreements (SLAs)

C.

Ensuring encryption for data in transit

D.

Utilizing a formal change management process

Full Access
Question # 65

Which of the following BEST indicates that an information security governance framework has been successfully implemented?

A.

The framework aligns internal and external resources.

B.

The framework aligns security processes with industry best practices.

C.

The framework aligns management and other functions within the security organization.

D.

The framework includes commercial off-the-shelf security solutions.

Full Access
Question # 66

Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?

A.

Providing ongoing training to the incident response team

B.

Implementing proactive systems monitoring

C.

Implementing a honeypot environment

D.

Updating information security awareness materials

Full Access
Question # 67

An organization is performing due diligence when selecting a third party. Which of the following is MOST helpful to reduce the risk of unauthorized sharing of information during this process?

A.

Using secure communication channels

B.

Establishing mutual non-disclosure agreements (NDAs)

C.

Requiring third-party privacy policies

D.

Obtaining industry references

Full Access
Question # 68

Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?

A.

Ability to monitor and control incident management costs

B.

More visibility to the impact of disruptions

C.

Effective protection of information assets

D.

Optimized allocation of recovery resources

Full Access
Question # 69

Which of the following control types should be considered FIRST for aligning employee behavior with an organization's information security objectives?

A.

Administrative security controls

B.

Technical security controls

C.

Physical security controls

D.

Access security controls

Full Access
Question # 70

Which of the following should an information security manager do FIRST upon learning that a competitor has experienced a ransomware attack?

A.

Perform a full data backup.

B.

Conduct ransomware awareness training for all staff.

C.

Update indicators of compromise in the security systems.

D.

Review the current risk assessment.

Full Access
Question # 71

An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?

A.

Definition of when a disaster should be declared

B.

Requirements for regularly testing backups

C.

Recovery time objectives (RTOs)

D.

The disaster recovery communication plan

Full Access
Question # 72

Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?

A.

Requiring an external security audit of the IT service provider

B.

Requiring regular reporting from the IT service provider

C.

Defining information security requirements with internal IT

D.

Defining the business recovery plan with the IT service provider

Full Access
Question # 73

When properly implemented, secure transmission protocols protect transactions:

A.

from eavesdropping.

B.

from denial of service (DoS) attacks.

C.

on the client desktop.

D.

in the server's database.

Full Access
Question # 74

Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?

A.

Presenting evidence of inherent risk

B.

Reporting the security maturity level

C.

Presenting compliance requirements

D.

Communicating the residual risk

Full Access
Question # 75

Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?

A.

Publish adopted information security standards.

B.

Perform annual information security compliance reviews.

C.

Implement an information security governance framework.

D.

Define penalties for information security noncompliance.

Full Access
Question # 76

Which of the following is the BEST way to ensure data is not co-mingled or exposed when using a cloud service provider?

A.

Obtain an independent audit report.

B.

Require the provider to follow stringent data classification procedures.

C.

Include high penalties for security breaches in the contract.

D.

Review the provider's information security policies.

Full Access
Question # 77

Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?

A.

Include the impact of the risk as part of regular metrics.

B.

Recommend the security steering committee conduct a review.

C.

Update the risk assessment at regular intervals

D.

Send regular notifications directly to senior managers

Full Access
Question # 78

Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?

A.

Demonstrating the program's value to the organization

B.

Discussing governance programs found in similar organizations

C.

Providing the results of external audits

D.

Providing examples of information security incidents within the organization

Full Access
Question # 79

During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?

A.

Post-incident review

B.

Eradication

C.

Containment

D.

Identification

Full Access
Question # 80

Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?

A.

Alive demonstration of the third-party supplier's security capabilities

B.

The ability to i third-party supplier's IT systems and processes

C.

Third-party security control self-assessment (CSA) results

D.

An independent review report indicating compliance with industry standards

Full Access
Question # 81

Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?

A.

Focus on addressing conflicts between security and performance.

B.

Collaborate with business and IT functions in determining controls.

C.

Include information security requirements in the change control process.

D.

Obtain assistance from IT to implement automated security cantrals.

Full Access
Question # 82

Which of the following is the BEST way to build a risk-aware culture?

A.

Periodically change risk awareness messages.

B.

Ensure that threats are documented and communicated in a timely manner.

C.

Establish a channel for staff to report risks.

D.

Periodically test compliance with security controls.

Full Access
Question # 83

What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?

A.

Perform a vulnerability assessment on the systems within the department.

B.

Introduce additional controls to force compliance with policy.

C.

Require department users to repeat security awareness training.

D.

Report the policy violation to senior management.

Full Access
Question # 84

Which of the following is MOST important for the effective implementation of an information security governance program?

A.

Employees receive customized information security training

B.

The program budget is approved and monitored by senior management

C.

The program goals are communicated and understood by the organization.

D.

Information security roles and responsibilities are documented.

Full Access
Question # 85

Which of the following provides the BEST evidence that a recently established infofmation security program is effective?

A.

The number of reported incidents has increased

B.

Regular IT balanced scorecards are communicated.

C.

Senior management has reported fewer junk emails.

D.

The number of tickets associated with IT incidents have stayed consistent

Full Access
Question # 86

Which of the following BEST indicates that information security governance and corporate governance are integrated?

A.

The information security team is aware of business goals.

B.

The board is regularly informed of information security key performance indicators (KPIs),

C.

The information security steering committee is composed of business leaders.

D.

A cost-benefit analysis is conducted on all information security initiatives.

Full Access
Question # 87

Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?

A.

Capability maturity model

B.

Vulnerability assessment

C.

IT security risk and exposure

D.

Business impact analysis (BIA)

Full Access
Question # 88

An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?

A.

Implementing separation of duties between systems and data

B.

Including penalty clauses for noncompliance in the vendor contract

C.

Disabling vendor access and only re-enabling when access is needed

D.

Monitoring key risk indicators (KRIs)

Full Access
Question # 89

Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?

A.

Mobile application control

B.

Inconsistent device security

C.

Configuration management

D.

End user acceptance

Full Access
Question # 90

Implementing the principle of least privilege PRIMARILY requires the identification of:

A.

job duties

B.

data owners

C.

primary risk factors.

D.

authentication controls

Full Access
Question # 91

Which of the following BEST illustrates residual risk within an organization?

A.

Heat map

B.

Risk management framework

C.

Business impact analysis (BIA)

D.

Balanced scorecard

Full Access
Question # 92

Senior management wants to thoroughly test a disaster recovery plan (DRP) for a mission-critical system. Which of the following would provide the MOST reliable results?

A.

Full interruption test

B.

Parallel test

C.

Simulation test

D.

Structured walk-through

Full Access
Question # 93

Which of the following is the BEST way to address data availability concerns when outsourcing information security administration?

A.

Develop service level agreements (SLAs).

B.

Stipulate insurance requirements.

C.

Require nondisclosure agreements (NDAs).

D.

Create contingency plans.

Full Access
Question # 94

The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:

A.

results of exit interviews.

B.

previous training sessions.

C.

examples of help desk requests.

D.

responses to security questionnaires.

Full Access
Question # 95

Which of the following is the PRIMARY role of the information security manager in application development?

A.

To ensure security is integrated into the system development life cycle (SDLC)

B.

To ensure compliance with industry best practice

C.

To ensure enterprise security controls are implemented

D.

To ensure control procedures address business risk

Full Access
Question # 96

Which of the following is MOST important for building 4 robust information security culture within an organization?

A.

Mature information security awareness training across the organization

B.

Strict enforcement of employee compliance with organizational security policies

C.

Security controls embedded within the development and operation of the IT environment

D.

Senior management approval of information security policies

Full Access
Question # 97

An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?

A.

The information security manager

B.

The data owner

C.

The application owner

D.

The security engineer

Full Access
Question # 98

Which of the following BEST demonstrates the added value of an information security program?

A.

Security baselines

B.

A gap analysis

C.

A SWOT analysis

D.

A balanced scorecard

Full Access
Question # 99

The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:

A.

the organization has the required funds to implement the plan.

B.

compliance with legal and regulatory requirements.

C.

staff participation in information security efforts.

D.

the plan aligns with corporate governance.

Full Access
Question # 100

Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?

A.

The organization's risk tolerance

B.

The organization's mission

C.

Resource availability

D.

Incident response team training

Full Access
Question # 101

An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?

A.

Control owner responses based on a root cause analysis

B.

The impact of noncompliance on the organization's risk profile

C.

A noncompliance report to initiate remediation activities

D.

A business case for transferring the risk

Full Access
Question # 102

When developing an asset classification program, which of the following steps should be completed FIRST?

A.

Categorize each asset.

B.

Create an inventory. &

C.

Create a business case for a digital rights management tool.

D.

Implement a data loss prevention (OLP) system.

Full Access
Question # 103

Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?

A.

Patch management files

B.

Network system logs

C.

Configuration management files

D.

Intrusion detection system (IDS) logs

Full Access
Question # 104

Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?

A.

Data privacy officer

B.

Information security manager

C.

Head of IT department

D.

Head of human resources (HR)

Full Access
Question # 105

An organization has determined that fixing a security vulnerability in a critical application is too costly to be feasible, but the impact is material to the business. Which of the following is the MOST appropriate risk treatment?

A.

Purchase cybersecurity insurance.

B.

Accept the risk associated with continued use of the application.

C.

Implement compensating controls for the application.

D.

Discontinue using the application.

Full Access
Question # 106

When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?

A.

External consultant

B.

Information owners

C.

Information security manager

D.

Business continuity coordinator

Full Access
Question # 107

For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:

A.

consistent security.

B.

comprehensive audits

C.

a security-aware culture

D.

compliance with policy

Full Access
Question # 108

Which of the following presents the GREATEST challenge to a large multinational organization using an automated identity and access management (1AM) system?

A.

Staff turnover rates that significantly exceed industry averages

B.

Large number of applications in the organization

C.

Inaccurate workforce data from human resources (HR)

D.

Frequent changes to user roles during employment

Full Access
Question # 109

Who is BEST suited to determine how the information in a database should be classified?

A.

Database analyst

B.

Database administrator (DBA)

C.

Information security analyst

D.

Data owner

Full Access
Question # 110

Which of the following should be done FIRST when establishing an information security governance framework?

A.

Evaluate information security tools and skills relevant for the environment.

B.

Gain an understanding of the business and cultural attributes.

C.

Contract a third party to conduct an independent review of the program.

D.

Conduct a cost-benefit analysis of the framework.

Full Access
Question # 111

Which of the following is the PRIMARY objective of a cyber resilience strategy?

A.

Business continuity

B.

Regulatory compliance

C.

Employee awareness

D.

Executive support

Full Access
Question # 112

Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?

A.

Incorporate policy statements derived from third-party standards and benchmarks.

B.

Adhere to a unique corporate privacy and security standard

C.

Establish baseline standards for all locations and add supplemental standards as required

D.

Require that all locations comply with a generally accepted set of industry

Full Access
Question # 113

An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''

A.

Deploy mobile device management (MDM)

B.

Implement remote wipe capability.

C.

Create an acceptable use policy.

D.

Conduct a mobile device risk assessment

Full Access
Question # 114

Which of the following will BEST facilitate timely and effective incident response?

A.

Including penetration test results in incident response planning

B.

Assessing the risk of compromised assets

C.

Classifying the severity of an incident

D.

Notifying stakeholders when invoking the incident response plan

Full Access
Question # 115

Which of the following is the BEST course of action when an online company discovers a network attack in progress?

A.

Dump all event logs to removable media

B.

Isolate the affected network segment

C.

Enable trace logging on ail events

D.

Shut off all network access points

Full Access
Question # 116

Which of the following is the BEST approach for governing noncompliance with security requirements?

A.

Base mandatory review and exception approvals on residual risk,

B.

Require users to acknowledge the acceptable use policy.

C.

Require the steering committee to review exception requests.

D.

Base mandatory review and exception approvals on inherent risk.

Full Access
Question # 117

Which of the following should be done FIRST when a SIEM flags a potential event?

A.

Validate the event is not a false positive.

B.

Initiate the incident response plan.

C.

Escalate the event to the business owner.

D.

Implement compensating controls.

Full Access
Question # 118

Which of the following is the PRIMARY benefit of an information security awareness training program?

A.

Influencing human behavior

B.

Evaluating organizational security culture

C.

Defining risk accountability

D.

Enforcing security policy

Full Access
Question # 119

A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:

A.

analysis of current threat landscape.

B.

historical data of reported incidents.

C.

projected return on investment (ROI).

D.

industry benchmarking gap analysis.

Full Access
Question # 120

Which of the following BEST enables an organization to maintain an appropriate security control environment?

A.

Alignment to an industry security framework

B.

Budgetary support for security

C.

Periodic employee security training

D.

Monitoring of the threat landscape

Full Access
Question # 121

An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?

A.

Benchmark the processes with best practice to identify gaps.

B.

Calculate the return on investment (ROI).

C.

Provide security awareness training to HR.

D.

Assess the business objectives of the processes.

Full Access
Question # 122

A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:

A.

developing a security program that meets global and regional requirements.

B.

ensuring effective communication with local regulatory bodies.

C.

using industry best practice to meet local legal regulatory requirements.

D.

monitoring compliance with defined security policies and standards.

Full Access
Question # 123

Which of the following is MOST important when designing security controls for new cloud-based services?

A.

Evaluating different types of deployment models according to the associated risks

B.

Understanding the business and IT strategy for moving resources to the cloud

C.

Defining an incident response policy to protect data moving between onsite and cloud applications

D.

Performing a business impact analysis (BIA) to gather information needed to develop recovery strategies

Full Access
Question # 124

Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?

A.

To improve awareness of information security

B.

To disclose the root cause of the incident

C.

To increase goodwill toward the organization

D.

To comply with regulations regarding notification

Full Access
Question # 125

A new risk has been identified in a high availability system. The BEST course of action is to:

A.

Perform a cost-benefit analysis for mitigating controls

B.

Recommend risk acceptance to the business owner

C.

Develop and implement a plan to mitigate the identified risk

D.

Evaluate and prioritize the identified risk

Full Access
Question # 126

A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?

A.

Inadequate incident response controls

B.

Lack of legal review

C.

Inadequate change control

D.

Lack of quality control

Full Access
Question # 127

Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?

A.

Perform a risk analysis for critical applications.

B.

Determine whether critical success factors (CSFs) have been defined.

C.

Conduct a capability maturity model evaluation.

D.

Review and update current operational procedures.

Full Access
Question # 128

Which of the following is the BEST indication that an organization has integrated information security governance with corporate governance?

A.

Security performance metrics are measured against business objectives.

B.

Impact is measured according to business loss when assessing IT risk.

C.

Security policies are reviewed whenever business objectives are changed.

D.

Service levels for security vendors are defined according to business needs.

Full Access
Question # 129

Which of the following would BEST justify continued investment in an information security program?

A.

Reduction in residual risk

B.

Security framework alignment

C.

Speed of implementation

D.

Industry peer benchmarking

Full Access
Question # 130

An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?

A.

Conduct user awareness training within the IT function.

B.

Propose that IT update information security policies and procedures.

C.

Determine the risk related to noncompliance with the policy.

D.

Request that internal audit conduct a review of the policy development process,

Full Access
Question # 131

Which of the following is the BEST indication of information security strategy alignment with the “&

A.

Percentage of information security incidents resolved within defined service level agreements (SLAs)

B.

Percentage of corporate budget allocated to information security initiatives

C.

Number of business executives who have attended information security awareness sessions

D.

Number of business objectives directly supported by information security initiatives

Full Access
Question # 132

An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?

A.

Employees use smartphone tethering when accessing from remote locations.

B.

Employees physically lock PCs when leaving the immediate area.

C.

Employees are trained on the acceptable use policy.

D.

Employees use the VPN when accessing the organization's online resources.

Full Access
Question # 133

Which type of control is an incident response team?

A.

Preventive

B.

Detective

C.

Corrective

D.

Directive

Full Access
Question # 134

Which of the following metrics would provide an accurate measure of an information security program's performance?

A.

A collection of qualitative indicators that accurately measure security exceptions

B.

A combination of qualitative and quantitative trends that enable decision making

C.

A collection of quantitative indicators that are compared against industry benchmarks

D.

A single numeric score derived from various measures assigned to the security program

Full Access
Question # 135

Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?

A.

Network address translation (NAT)

B.

Message hashing

C.

Transport Layer Security (TLS)

D.

Multi-factor authentication

Full Access
Question # 136

Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?

A.

Senior management

B.

Information owner

C.

Business manager

D.

Information security manager

Full Access
Question # 137

Which of the following is the MOST common cause of cybersecurity breaches?

A.

Lack of adequate password rotation

B.

Human error

C.

Abuse of privileged accounts

D.

Lack of control baselines

Full Access
Question # 138

A global organization has outsourced security processes to a service provider by means of a global agreement. What is the MOST efficient approach to meet country-specific regulatory requirements?

A.

Include binding corporate rules into the global agreement

B.

Review the agreement for each country separately

C.

Set up a governance organization for each country

D.

Set up companion agreements for each country

Full Access
Question # 139

Which of the following is the MOST important reason to consider organizational culture when developing an information security program?

A.

Everyone in the organization is responsible for information security.

B.

It helps expedite approval for the information security budget.

C.

It helps the organization meet compliance requirements.

D.

Security incidents have an adverse impact on the entire organization.

Full Access
Question # 140

Which of the following is the BEST way to ensure the capability to restore clean data after a ransomware attack?

A.

Purchase cyber insurance

B.

Encrypt sensitive production data

C.

Perform Integrity checks on backups

D.

Maintain multiple offline backups

Full Access
Question # 141

When establishing an information security governance framework, it is MOST important for an information security manager to understand:

A.

information security best practices.

B.

risk management techniques.

C.

the threat environment.

D.

the corporate culture.

Full Access
Question # 142

Which of the following is MOST important to have in place when conducting a security control assessment of a system?

A.

Control specifications

B.

Assurance test plan

C.

Scanning tools

D.

Security documentation

Full Access
Question # 143

An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?

A.

Local regulations

B.

Data backup strategy

C.

Consistency in awareness programs

D.

Organizational reporting structure

Full Access
Question # 144

An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?

A.

Implement a SIEM solution.

B.

Perform a threat analysis.

C.

Establish performance metrics for the team.

D.

Perform a post-incident review.

Full Access
Question # 145

Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?

A.

Cost of the attack to the organization

B.

Location of the attacker

C.

Method of operation used by the attacker

D.

Details from intrusion detection system (IDS) logs

Full Access
Question # 146

Which of the following is the MOST appropriate risk response when the risk impact has been determined to be immaterial and the likelihood is very low?

A.

Mitigate

B.

Avoid

C.

Transfer

D.

Accept

Full Access
Question # 147

In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?

A.

Access to the hardware

B.

Data encryption

C.

Non-standard event logs

D.

Compressed customer data

Full Access
Question # 148

Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?

A.

Perform a risk assessment.

B.

Reduce security hardening settings.

C.

Inform business management of the risk.

D.

Document a security exception.

Full Access
Question # 149

An incident handler is preparing a forensic image of a hard drive. Which of the following MUST be done to provide evidence that the image is an exact copy of the original?

A.

Perform a manual verification of file counts.

B.

Encrypt and back up the hard drive before copying.

C.

Use the same hardware for the image as the original.

D.

Perform digital hashing of the original and the image.

Full Access
Question # 150

Which of the following business units should own the data that populates an identity management system?

A.

Human resources (HR)

B.

Legal

C.

Information technology

D.

Information security

Full Access
Question # 151

Which of the following is MOST critical when creating an incident response plan?

A.

Identifying vulnerable data assets

B.

Identifying what constitutes an incident

C.

Documenting incident notification and escalation processes

D.

Aligning with the risk assessment process

Full Access
Question # 152

To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?

A.

Gap analysis results

B.

Level of residual risk

C.

Level of risk treatment

D.

Configuration parameters

Full Access
Question # 153

When establishing metrics for an information security program, the BEST approach is to identify indicators that:

A.

reduce information security program spending.

B.

support major information security initiatives.

C.

reflect the corporate risk culture.

D.

demonstrate the effectiveness of the security program.

Full Access
Question # 154

Which of the following is MOST important when designing an information security governance framework?

A.

Aligning with the information security strategy

B.

Assessing the availability of information security resources

C.

Aligning with industry best practice frameworks

D.

Assessing the current state of information security

Full Access
Question # 155

The MAIN benefit of implementing a data loss prevention (DLP) solution is to:

A.

enhance the organization's antivirus controls.

B.

eliminate the risk of data loss.

C.

complement the organization's detective controls.

D.

reduce the need for a security awareness program.

Full Access
Question # 156

Which of the following BEST supports the incident management process for attacks on an organization's supply chain?

A.

Including service level agreements (SLAs) in vendor contracts

B.

Establishing communication paths with vendors

C.

Requiring security awareness training for vendor staff

D.

Performing integration testing with vendor systems

Full Access
Question # 157

An organization has just updated its backup capability to a new cloud-based solution. Which of the following tests will MOST effectively verify this change is working as intended?

A.

Tabletop testing

B.

Black box testing

C.

Parallel testing

D.

Simulation testing

Full Access
Question # 158

Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?

A.

Legal and regulatory requirements

B.

Likelihood of a disaster

C.

Organizational tolerance to service interruption

D.

Geographical location of the backup site

Full Access
Question # 159

Which of the following should be done FIRST when implementing a security program?

A.

Perform a risk analysis

B.

Implement data encryption.

C.

Create an information asset inventory.

D.

Determine the value of information assets.

Full Access
Question # 160

Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?

A.

Impact on compliance risk.

B.

Inability to determine short-term impact.

C.

Impact on the risk culture.

D.

Deviation from risk management best practices

Full Access
Question # 161

A multinational organization is introducing a security governance framework. The information security manager's concern is that regional security practices differ. Which of the following should be evaluated FIRST?

A.

Local regulatory requirements

B.

Global framework standards

C.

Cross-border data mobility

D.

Training requirements of the framework

Full Access
Question # 162

A business impact analysis (BIA) BEST enables an organization to establish:

A.

annualized loss expectancy (ALE).

B.

recovery methods.

C.

total cost of ownership (TCO).

D.

restoration priorities.

Full Access
Question # 163

Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?

A.

Reducing the number of vulnerabilities detected

B.

Ensuring the amount of residual risk is acceptable

C.

Avoiding identified system threats

D.

Complying with regulatory requirements

Full Access
Question # 164

A new information security manager finds that the organization tends to use short-term solutions to address problems. Resource allocation and spending are not effectively tracked, and there is no assurance that compliance requirements are being met. What should be done FIRST to reverse this bottom-up approach to security?

A.

Conduct a threat analysis.

B.

Implement an information security awareness training program.

C.

Establish an audit committee.

D.

Create an information security steering committee.

Full Access
Question # 165

An online trading company discovers that a network attack has penetrated the firewall. What should be the information security manager's FIRST response?

A.

Notify the regulatory agency of the incident.

B.

Implement mitigating controls.

C.

Evaluate the impact to the business.

D.

Examine firewall logs to identify the attacker.

Full Access
Question # 166

Which of the following BEST demonstrates that an anti-phishing campaign is effective?

A.

Improved staff attendance in awareness sessions

B.

Decreased number of phishing emails received

C.

Improved feedback on the anti-phishing campaign

D.

Decreased number of incidents that have occurred

Full Access
Question # 167

A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?

A.

Perform a backup of the hard drive using backup utilities.

B.

Perform a bit-by-bit backup of the hard disk using a write-blocking device

C.

Perform a backup of the computer using the network

D.

Reboot the system using third-party forensic software in the CD-ROM drive

Full Access
Question # 168

Which of the following is the BEST defense against a brute force attack?

A.

Time-of-day restrictions

B.

Mandatory access control

C.

Discretionary access control

D.

Multi-factor authentication (MFA)

Full Access
Question # 169

Which of the following is the PRIMARY objective of information asset classification?

A.

Vulnerability reduction

B.

Compliance management

C.

Risk management

D.

Threat minimization

Full Access
Question # 170

Which of the following is the BEST reason to implement an information security architecture?

A.

Assess the cost-effectiveness of the integration.

B.

Fast-track the deployment of information security components.

C.

Serve as a post-deployment information security road map.

D.

Facilitate consistent implementation of security requirements.

Full Access
Question # 171

Which of the following is the PRIMARY reason to assign a risk owner in an organization?

A.

To remediate residual risk

B.

To define responsibilities

C.

To ensure accountability

D.

To identify emerging risk

Full Access
Question # 172

Which of the following is the BEST way to obtain organization-wide support for an information security program?

A.

Mandate regular security awareness training.

B.

Develop security performance metrics.

C.

Position security as a business enabler.

D.

Prioritize security initiatives based on IT strategy.

Full Access
Question # 173

Which of the following BEST facilitates the development of a comprehensive information security policy?

A.

Alignment with an established information security framework

B.

An established internal audit program

C.

Security key performance indicators (KPIs)

D.

Areview of recent information security incidents

Full Access
Question # 174

An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:

A.

determine the security exposures.

B.

assess the ability to integrate the security department operations.

C.

ensure compliance with international standards.

D.

evaluate the security policy and standards.

Full Access
Question # 175

What is the PRIMARY benefit to an organization when information security program requirements are aligned with employment and staffing processes?

A.

Security incident reporting procedures are followed.

B.

Security staff turnover is reduced.

C.

Information assets are classified appropriately.

D.

Access is granted based on task requirements.

Full Access
Question # 176

Which of the following is the BEST indication ofa successful information security culture?

A.

Penetration testing is done regularly and findings remediated.

B.

End users know how to identify and report incidents.

C.

Individuals are given roles based on job functions.

D.

The budget allocated for information security is sufficient.

Full Access
Question # 177

Which of the following should be done FIRST when establishing a new data protection program that must comply with applicable data privacy regulations?

A.

Evaluate privacy technologies required for data protection.

B.

Encrypt all personal data stored on systems and networks.

C.

Update disciplinary processes to address privacy violations.

D.

Create an inventory of systems where personal data is stored.

Full Access
Question # 178

Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?

A.

Impose state limits on servers.

B.

Spread a site across multiple ISPs.

C.

Block the attack at the source.

D.

Harden network security.

Full Access
Question # 179

Who is accountable for approving an information security governance framework?

A.

The board of directors

B.

The chief information security officer (ClSO)

C.

The enterprise risk committee

D.

The chief information officer (CIO)

Full Access
Question # 180

Of the following, whose input is of GREATEST importance in the development of an information security strategy?

A.

Process owners

B.

End users

C.

Security architects.

D.

Corporate auditors

Full Access
Question # 181

Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?

A.

Evaluate the results of business continuity testing.

B.

Review key performance indicators (KPIs).

C.

Evaluate the business impact of incidents.

D.

Engage business process owners.

Full Access
Question # 182

Which type of backup BEST enables an organization to recover data after a ransomware attack?

A.

Online backup

B.

Incremental backup

C.

Differential backup

D.

Offline backup

Full Access
Question # 183

Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?

A.

Perform a patch update.

B.

Conduct a risk assessment.

C.

Perform a penetration test.

D.

Conduct an impact assessment.

Full Access
Question # 184

Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?

A.

Define policies and standards for data processing.

B.

Implement applicable privacy principles

C.

Assess local or regional regulations

D.

Research cyber insurance policies

Full Access
Question # 185

Which of the following is MOST important to consider when defining control objectives?

A.

Industry best practices

B.

An information security framework

C.

Control recommendations from a recent audit

D.

The organization's risk appetite

Full Access
Question # 186

An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?

A.

Block network access until security awareness training is complete.

B.

Conduct an enterprise cybersecurity risk assessment.

C.

Obtain key stakeholder and leadership support.

D.

Send an email mandating training for the employees.

Full Access
Question # 187

Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?

A.

Review the previous risk assessment and countermeasures.

B.

Perform a new risk assessment,

C.

Evaluate countermeasures to mitigate new risks.

D.

Transfer the new risk to a third party.

Full Access
Question # 188

An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?

A.

Conduct an information security audit.

B.

Validate the relevance of the information.

C.

Perform a gap analysis.

D.

Inform senior management

Full Access
Question # 189

In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:

A.

change activities are documented.

B.

the rationale for acceptance is periodically reviewed.

C.

the acceptance is aligned with business strategy.

D.

compliance with the risk acceptance framework.

Full Access
Question # 190

The MOST important element in achieving executive commitment to an information security governance program is:

A.

a defined security framework.

B.

a process improvement model

C.

established security strategies.

D.

identified business drivers.

Full Access
Question # 191

Which of the following is MOST helpful to identify whether information security policies have been followed?

A.

Preventive controls

B.

Detective controls

C.

Directive controls

D.

Corrective controls

Full Access
Question # 192

To support effective risk decision making, which of the following is MOST important to have in place?

A.

Established risk domains

B.

Risk reporting procedures

C.

An audit committee consisting of mid-level management

D.

Well-defined and approved controls

Full Access
Question # 193

An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?

A.

Business impact analysis (BIA)

B.

Business continuity plan (BCP)

C.

Incident response plan

D.

Disaster recovery plan (DRP)

Full Access
Question # 194

An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?

A.

Determine whether the organization can benefit from adopting the new standard.

B.

Obtain legal counsel's opinion on the standard's applicability to regulations,

C.

Perform a risk assessment on the new technology.

D.

Review industry specialists’ analyses of the new standard.

Full Access
Question # 195

Of the following, who is in the BEST position to evaluate business impacts?

A.

Senior management

B.

Information security manager

C.

IT manager

D.

Process manager

Full Access
Question # 196

Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?

A.

Information security program metrics

B.

Results of a recent external audit

C.

The information security operations matrix

D.

Changes to information security risks

Full Access
Question # 197

Which of the following has the GREATEST impact on efforts to improve an organization's security posture?

A.

Regular reporting to senior management

B.

Supportive tone at the top regarding security

C.

Automation of security controls

D.

Well-documented security policies and procedures

Full Access
Question # 198

Which of the following MUST happen immediately following the identification of a malware incident?

A.

Preparation

B.

Recovery

C.

Containment

D.

Eradication

Full Access
Question # 199

Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?

A.

Inform the public relations officer.

B.

Monitor the third party's response.

C.

Invoke the incident response plan.

D.

Inform customers of the breach.

Full Access
Question # 200

An organization is considering the feasibility of implementing a big data solution to analyze customer data. In order to support this initiative, the information security manager should FIRST:

A.

inventory sensitive customer data to be processed by the solution.

B.

determine information security resource and budget requirements.

C.

assess potential information security risk to the organization.

D.

develop information security requirements for the big data solution.

Full Access
Question # 201

Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?

A.

Execute a risk treatment plan.

B.

Review contracts and statements of work (SOWs) with vendors.

C.

Implement data regionalization controls.

D.

Determine current and desired state of controls.

Full Access
Question # 202

Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?

A.

The security strategy is promoted.

B.

Fewer security incidents are reported.

C.

Security behavior is improved.

D.

More security incidents are detected.

Full Access
Question # 203

An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?

A.

Establishing the authority to remote wipe

B.

Developing security awareness training

C.

Requiring the backup of the organization's data by the user

D.

Monitoring how often the smartphone is used

Full Access
Question # 204

Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?

A.

To ensure industry best practices for enterprise security are followed

B.

To establish the minimum level of controls needed

C.

To determine the desired state of enterprise security

D.

To satisfy auditors' recommendations for enterprise security

Full Access
Question # 205

An organization is increasingly using Software as a Service (SaaS) to replace in-house hosting and support of IT applications. Which of the following would be the MOST effective way to help ensure procurement decisions consider information security concerns?

A.

Integrate information security risk assessments into the procurement process.

B.

Provide regular information security training to the procurement team.

C.

Invite IT members into regular procurement team meetings to influence best practice.

D.

Enforce the right to audit in procurement contracts with SaaS vendors.

Full Access
Question # 206

Which of the following will BEST facilitate the integration of information security governance into enterprise governance?

A.

Developing an information security policy based on risk assessments

B.

Establishing an information security steering committee

C.

Documenting the information security governance framework

D.

Implementing an information security awareness program

Full Access
Question # 207

Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?

A.

Intrusion detection

B.

Log monitoring

C.

Patch management

D.

Antivirus software

Full Access
Question # 208

The PRIMARY objective of performing a post-incident review is to:

A.

re-evaluate the impact of incidents.

B.

identify vulnerabilities.

C.

identify control improvements.

D.

identify the root cause.

Full Access
Question # 209

A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?

A.

Mitigate

B.

Accept

C.

Transfer

D.

Avoid

Full Access
Question # 210

Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?

A.

Security risk analysis

B.

Gap assessment

C.

Maturity assessment

D.

Vulnerability scan report

Full Access
Question # 211

Which of the following is MOST useful to an information security manager when determining the need to escalate an incident to senior?

A.

Incident management procedures

B.

Incident management policy

C.

System risk assessment

D.

Organizational risk register

Full Access
Question # 212

Which of the following is the MOST effective way to ensure information security policies are understood?

A.

Implement a whistle-blower program.

B.

Provide regular security awareness training.

C.

Include security responsibilities in job descriptions.

D.

Document security procedures.

Full Access
Question # 213

Information security controls should be designed PRIMARILY based on:

A.

a business impact analysis (BIA).

B.

regulatory requirements.

C.

business risk scenarios,

D.

a vulnerability assessment.

Full Access
Question # 214

Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?

A.

Ensure a plan with milestones is developed.

B.

Implement a distributed denial of service (DDoS) control.

C.

Engage the incident response team.

D.

Define new key performance indicators (KPIs).

Full Access
Question # 215

Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?

A.

Review the key performance indicator (KPI) dashboard

B.

Review security-related key risk indicators (KRIs)

C.

Review control self-assessment (CSA) results

D.

Review periodic security audits

Full Access
Question # 216

When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?

A.

Risk owner

B.

Control owner

C.

Business system owner

D.

Application owner

Full Access
Question # 217

Which of the following is the MOST important reason to involve external forensics experts in evidence collection when responding to a major security breach?

A.

To ensure evidence is handled by qualified resources

B.

To validate the incident response process

C.

To provide the response team with expert training on evidence handling

D.

To prevent evidence from being disclosed to any internal staff members

Full Access
Question # 218

If the investigation of an incident is not completed within the time allocated in the incident response plan, which of the following actions should be taken by the incident response team?

A.

Initiate the escalation process.

B.

Continue the investigation.

C.

Invoke the business continuity plan (BCP).

D.

Engage the crisis management team.

Full Access
Question # 219

Several months after the installation of a new firewall with intrusion prevention features to block malicious activity, a breach was discovered that came in through the firewall shortly after installation. This breach could have been detected earlier by implementing firewall:

A.

packet filtering.

B.

web surfing controls.

C.

log monitoring.

D.

application awareness.

Full Access
Question # 220

An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?

A.

IT strategy

B.

Security architecture

C.

Business case

D.

Risk assessment

Full Access
Question # 221

Which of the following metrics would BEST demonstrate the success of a newly implemented information security framework?

A.

An increase in the number of identified security incidents

B.

A decrease in the number of security audit findings

C.

A decrease in the number of security policy exceptions

D.

An increase in the number of compliant business processes

Full Access
Question # 222

Penetration testing is MOST appropriate when a:

A.

new system is about to go live.

B.

new system is being designed.

C.

security policy is being developed.

D.

security incident has occurred,

Full Access
Question # 223

Which of the following is the BEST option to lower the cost to implement application security controls?

A.

Perform security tests in the development environment.

B.

Integrate security activities within the development process

C.

Perform a risk analysis after project completion.

D.

Include standard application security requirements

Full Access
Question # 224

Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?

A.

The capabilities and expertise of the information security team

B.

The organization's mission statement and roadmap

C.

A prior successful information security strategy

D.

The organization's information technology (IT) strategy

Full Access
Question # 225

Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?

A.

Establishing the root cause of the incident

B.

Identifying attack vectors utilized in the incident

C.

When business operations were restored after the incident

D.

How incident management processes were executed

Full Access
Question # 226

Which of the following should be the PRIMARY goal of information security?

A.

Information management

B.

Regulatory compliance

C.

Data governance

D.

Business alignment

Full Access
Question # 227

An organization has identified a large volume of old data that appears to be unused. Which of the following should the information

security manager do NEXT?

A.

Consult the record retention policy.

B.

Update the awareness and training program.

C.

Implement media sanitization procedures.

D.

Consult the backup and recovery policy.

Full Access
Question # 228

The PRIMARY reason for creating a business case when proposing an information security project is to:

A.

articulate inherent risks.

B.

provide demonstrated return on investment (ROI).

C.

establish the value of the project in relation to business objectives.

D.

gain key business stakeholder engagement.

Full Access
Question # 229

IT projects have gone over budget with too many security controls being added post-production. Which of the following would MOST help to ensure that relevant controls are applied to a project?

A.

Involving information security at each stage of project management

B.

Identifying responsibilities during the project business case analysis

C.

Creating a data classification framework and providing it to stakeholders

D.

Providing stakeholders with minimum information security requirements

Full Access
Question # 230

An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?

A.

Prepare an executive summary for senior management

B.

Gather feedback on business impact

C.

Conduct a meeting to capture lessons learned.

D.

Secure and preserve digital evidence for analysis.

Full Access
Question # 231

Which of the following is the PRIMARY responsibility of an information security governance committee?

A.

Discussing upcoming information security projects

B.

Reviewing the information security risk register

C.

Approving changes to the information security strategy

D.

Reviewing monthly information security metrics

Full Access
Question # 232

Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?

A.

Clearer segregation of duties

B.

Increased user productivity

C.

Increased accountability

D.

Fewer security incidents

Full Access
Question # 233

In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or

A.

Security budget

B.

Risk register

C.

Risk score

D.

Laws and regulations

Full Access
Question # 234

Which of the following should be the NEXT step after a security incident has been reported?

A.

Recovery

B.

Investigation

C.

Escalation

D.

Containment

Full Access
Question # 235

Which of the following has the GREATEST influence on the successful integration of information security within the business?

A.

Organizational structure and culture

B.

Risk tolerance and organizational objectives

C.

The desired state of the organization

D.

Information security personnel

Full Access
Question # 236

Which of the following is the BEST indication of a mature information security program?

A.

Security incidents are managed properly.

B.

Security spending is below budget.

C.

Security resources are optimized.

D.

Security audit findings are reduced.

Full Access
Question # 237

Which of the following is an information security manager's MOST important course of action after receiving information about a new cybersecurity threat?

A.

Assess the impact of the new threat on the organization in the event of materialization.

B.

Update correlation rules for log monitoring to detect the possible emerging threat.

C.

Report the threat to senior management immediately to enable an informed decision.

D.

Review the enterprise architecture (EA) for vulnerabilities exploited by the threat.

Full Access
Question # 238

When is the BEST time to verify that a production system's security mechanisms meet control objectives?

A.

During quality and acceptance checks

B.

On a continuous basis through monitoring activities and automated tooling

C.

After remediations recommended by penetration tests have been completed

D.

During annual internal and compliance audits

Full Access
Question # 239

Which of the following should be the PRIMARY consideration when developing an incident response plan?

A.

The definition of an incident

B.

Compliance with regulations

C.

Management support

D.

Previously reported incidents

Full Access
Question # 240

A project team member notifies the information security manager of a potential security risk that has not been included in the risk register. Which of the following should the information security manager do FIRST?

A.

Implement compensating controls.

B.

Analyze the identified risk.

C.

Prepare a risk mitigation plan.

D.

Add the risk to the risk register.

Full Access
Question # 241

Which of the following should have the MOST influence on the development of information security policies?

A.

Business strategy

B.

Past and current threats

C.

IT security framework

D.

Industry standards

Full Access
Question # 242

An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?

A.

Wipe the affected system.

B.

Notify internal legal counsel.

C.

Notify senior management.

D.

Isolate the impacted endpoints.

Full Access
Question # 243

A financial institution is planning to develop a new mobile application. Which of the following is the BEST time to begin assessments of the application's security compliance?

A.

During user acceptance testing (UAT)

B.

During the design phase

C.

During static code analysis

D.

During regulatory review

Full Access
Question # 244

Which of the following is the MOST effective way to convey information security responsibilities across an organization?

A.

Implementing security awareness programs

B.

Documenting information security responsibilities within job descriptions

C.

Developing a skills matrix

D.

Defining information security responsibilities in the security policy

Full Access
Question # 245

While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?

A.

The test is scheduled to reduce operational impact.

B.

The test involves IT members in the test process.

C.

The test addresses the critical components.

D.

The test simulates actual prime-time processing conditions.

Full Access
Question # 246

Recovery time objectives (RTOs) are an output of which of the following?

A.

Business continuity plan (BCP)

B.

Disaster recovery plan (DRP)

C.

Service level agreement (SLA)

D.

Business impact analysis (BIA)

Full Access
Question # 247

A penetration test against an organization's external web application shows several vulnerabilities. Which of the following presents the GREATEST concern?

A.

A rules of engagement form was not signed prior to the penetration test

B.

Vulnerabilities were not found by internal tests

C.

Vulnerabilities were caused by insufficient user acceptance testing (UAT)

D.

Exploit code for one of the vulnerabilities is publicly available

Full Access
Question # 248

When investigating an information security incident, details of the incident should be shared:

A.

widely to demonstrate positive intent.

B.

only with management.

C.

only as needed,

D.

only with internal audit.

Full Access
Question # 249

Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?

A.

Establish key risk indicators (KRIs).

B.

Use quantitative risk assessment methods.

C.

Provide regular reporting on risk treatment to senior management

D.

Require steering committee approval of risk treatment plans.

Full Access
Question # 250

Which of the following should be the FIRST step in patch management procedures when receiving an emergency security patch?

A.

Schedule patching based on the criticality.

B.

Install the patch immediately to eliminate the vulnerability.

C.

Conduct comprehensive testing of the patch.

D.

Validate the authenticity of the patch.

Full Access
Question # 251

To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:

A.

security metrics are included in the service level agreement (SLA).

B.

contract clauses comply with the organization's information security policy.

C.

the information security policy of the third-party service provider is reviewed.

D.

right to audit is included in the service level agreement (SLA).

Full Access
Question # 252

An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?

A.

The total cost of the investment

B.

The cost and associated risk reduction

C.

The number and severity of ransomware incidents

D.

Benchmarks of industry peers impacted by ransomware

Full Access
Question # 253

Which of the following is a function of the information security steering committee?

A.

Deliver external communication during incident response.

B.

Align the security framework with security standards.

C.

Align security strategy with business objectives.

D.

Monitor regulatory requirements.

Full Access
Question # 254

Which of the following roles is BEST able to influence the security culture within an organization?

A.

Chief information security officer (CISO)

B.

Chief information officer (CIO)

C.

Chief executive officer (CEO)

D.

Chief operating officer (COO)

Full Access
Question # 255

An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?

A.

Conduct a risk assessment.

B.

Communicate the changes to stakeholders.

C.

Update the organization's risk register.

D.

Develop a policy exception process.

Full Access
Question # 256

Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?

A.

Information security manager

B.

Information security steering committee

C.

Information owner

D.

Senior management

Full Access
Question # 257

When analyzing the emerging risk and threat landscape, an information security manager should FIRST:

A.

determine the impact if threats materialize.

B.

determine the sources of emerging threats.

C.

review historical threats within the industry.

D.

map threats to business assets.

Full Access
Question # 258

The executive management of a domestic organization has announced plans to expand operations to multiple international locations. Which of the following should be the information security manager's FIRST step upon learning of these plans?

A.

Perform a gap analysis against international information security standards

B.

Update security training and awareness resources accordingly

C.

Research legal and regulatory requirements impacting the new locations

D.

Prepare localized information security policies for each new location

Full Access
Question # 259

An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?

A.

Reinforce security awareness practices for end users.

B.

Temporarily outsource the email system to a cloud provider.

C.

Develop a business case to replace the system.

D.

Monitor outgoing traffic on the firewall.

Full Access
Question # 260

Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?

A.

Number of blocked intrusion attempts

B.

Number of business cases reviewed by senior management

C.

Trends in the number of identified threats to the business

D.

Percentage of controls integrated into business processes

Full Access
Question # 261

The PRIMARY advantage of single sign-on (SSO) is that it will:

A.

increase efficiency of access management

B.

increase the security of related applications.

C.

strengthen user passwords.

D.

support multiple authentication mechanisms.

Full Access
Question # 262

An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?

A.

Red team exercise

B.

Black box penetration test

C.

Disaster recovery exercise

D.

Tabletop exercise

Full Access
Question # 263

An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?

A.

Internal IT audit

B.

The data custodian

C.

The information security manager

D.

The data owner

Full Access
Question # 264

Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?

A.

To facilitate a qualitative risk assessment following the BIA

B.

To increase awareness of information security among key stakeholders

C.

To ensure the stakeholders providing input own the related risk

D.

To obtain input from as many relevant stakeholders as possible

Full Access
Question # 265

A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?

A.

Employee training on ransomware

B.

A properly tested offline backup system

C.

A continual server replication process

D.

A properly configured firewall

Full Access
Question # 266

Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?

A.

Threat management is enhanced.

B.

Compliance status is improved.

C.

Security metrics are enhanced.

D.

Proactive risk management is facilitated.

Full Access
Question # 267

An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?

A.

Establish an organization-wide social media policy.

B.

Develop sanctions for misuse of social media sites.

C.

Monitor social media sites visited by employees.

D.

Restrict social media access on corporate devices.

Full Access
Question # 268

Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?

A.

Removable storage media

B.

Disaster recovery plan (DRP)

C.

Offsite data backups

D.

Encrypted data drives

Full Access
Question # 269

Which of the following is MOST important for the improvement of a business continuity plan (BCP)?

A.

Incorporating lessons learned

B.

Implementing an IT resilience solution

C.

Implementing management reviews

D.

Documenting critical business processes

Full Access
Question # 270

An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:

A.

the chief risk officer (CRO).

B.

business senior management.

C.

the information security manager.

D.

the compliance officer.

Full Access
Question # 271

An internal audit has revealed that a number of information assets have been inappropriately classified. To correct the classifications, the remediation accountability should be assigned to:

A.

the business users.

B.

the information owners.

C.

the system administrators.

D.

senior management.

Full Access
Question # 272

An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:

A.

disable the user's access to corporate resources.

B.

terminate the device connectivity.

C.

remotely wipe the device

D.

escalate to the user's management

Full Access
Question # 273

Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?

A.

Maturity of incident response activities

B.

Threat environment

C.

Quantity of impacted assets

D.

Incident impact

Full Access
Question # 274

The BEST way to report to the board on the effectiveness of the information security program is to present:

A.

a dashboard illustrating key performance metrics.

B.

a summary of the most recent audit findings.

C.

peer-group industry benchmarks.

D.

a report of cost savings from process improvements.

Full Access
Question # 275

The PRIMARY purpose for deploying information security metrics is to:

A.

compare program effectiveness to benchmarks.

B.

support ongoing security budget requirements.

C.

ensure that technical operations meet specifications.

D.

provide information needed to make decisions.

Full Access
Question # 276

Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?

A.

Risk owner

B.

Control tester

C.

IT compliance leader

D.

Information security manager

Full Access