Saturday 16 May 2020

Pass CISM EXAM - Exam Questions

Pass CISM EXAM - Exam Questions



OR 



1
An information security manager suspects that the organization has suffered a ransomware attack. What should be done FIRST?


  1. Notify senior management.
  2. Confirm the infection.
  3. Isolate the affected systems.
  4. Alert employees to the attack.


ANS: 2

2
In a large organization requesting outsourced services, which of the following contract clauses is MOST important to the information security?


  1. Frequency of status reporting
  2. Compliance with security requirements
  3. Intellectual property
  4. Nondisclosure clause


ANS: 2

3
Relying on which of the following methods when detecting new threats using IDS should be of MOST concern?


  1. Statistical pattern recognition
  2. Traffic analysis
  3. Attack signatures
  4. Heuristic analysis


ANS: 3

4
The BEST time to ensure that a corporation acquires secure software products when outsourcing software development is during:


  1. security policy development.
  2. corporate security reviews.
  3. contract performance audits.
  4. contract negotiation.


ANS: 1

5
Which of the following is the BEST way for an information security manager to identify compliance with information security policies within


  1. Analyze system logs.
  2. Conduct periodic audits.
  3. Perform vulnerability assessments.
  4. Conduct security awareness testing.


ANS: 2

6
A multinational organization wants to ensure its privacy program appropriately addresses privacy risk throughout its operations. Which of the following is True?


  1. The privacy program does not include a formal training component.
  2. The organization does not have a dedicated privacy officer.
  3. Privacy policies are only reviewed annually.
  4. The organization uses a decentralized privacy governance structure.


ANS: 4

7
Establishing which of the following is the BEST way of ensuring that the emergence of new risk is promptly identified?


  1. Change control procedures
  2. Regular risk reporting
  3. Incident monitoring activities
  4. Risk monitoring processes


ANS: 4

8
In which of the following ways can an information security manager BEST ensure that security controls are adequate for supporting busines


  1. Reviewing results of the annual company external audit
  2. Adopting internationally accepted controls
  3. Using the risk management process
  4. Enforcing strict disciplinary procedures in case of noncompliance


ANS: 3


9
Following a successful and well-publicized hacking incident, an organization has plans to improve application security. Which of the following is True?


  1. Resources may not be available to support the implementation.
  2. Critical evidence may be lost.
  3. A trapdoor may have been installed in the application.
  4. The reputation of the organization may be damaged.


ANS: 1

10
Which of the following would be MOST important to consider when implementing security settings for a new system?


  1. Industry best practices applicable to the business
  2. Business objectives and related IT risk
  3. Results from internal and external audits
  4. Government regulations and related penalties


Ans: 2

No comments:

Post a Comment