Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

ISACA CISM CERTIFICATION EXAM, Exams of Cybercrime, Cybersecurity and Data Privacy

ISACA CISM CERTIFICATION EXAM WITH ANSWERS

Typology: Exams

2023/2024

Uploaded on 10/07/2024

DANTUTOR
DANTUTOR 🇬🇧

62 documents

1 / 2

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
ISACA CISM Certification Sample
Questions
01. IT-related risk management activities are MOST effective when they are:
a) treated as a distinct process
b) conducted by the IT department
c) communicated to all employees
d) integrated within business processes -
Answer:
d) integrated within business processes
02. A risk assessment and business impact analysis (BIA) have been completed for a
major proposed purchase and new process for an organization.
There is disagreement between the information security manager and the business
department manager who will be responsible for evaluating the results and identified
risk.
Which of the following would be the BEST approach of the information security
manager?
a) Acceptance of the business manager's decision on the risk to the corporation
b) Acceptance of the information security manager's decision on the risk to the
corporation
c) Review of the risk assessment with executive management for final input
d) Create a new risk assessment and BIA to resolve the disagreement -
Answer:
c) Review of the risk assessment with executive management for final input
03. Who is accountable for ensuring that information is categorized and that specific
protective measures are taken?
a) The security officer
b) Senior management
c) The end user
d) The custodian -
Answer:
b) Senior management
04. Abnormal server communication from inside the organization to external parties may
be monitored to:
pf2

Partial preview of the text

Download ISACA CISM CERTIFICATION EXAM and more Exams Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!

ISACA CISM Certification Sample

Questions

  1. IT-related risk management activities are MOST effective when they are: a) treated as a distinct process b) conducted by the IT department c) communicated to all employees d) integrated within business processes - Answer: d) integrated within business processes
  2. A risk assessment and business impact analysis (BIA) have been completed for a major proposed purchase and new process for an organization. There is disagreement between the information security manager and the business department manager who will be responsible for evaluating the results and identified risk. Which of the following would be the BEST approach of the information security manager? a) Acceptance of the business manager's decision on the risk to the corporation b) Acceptance of the information security manager's decision on the risk to the corporation c) Review of the risk assessment with executive management for final input d) Create a new risk assessment and BIA to resolve the disagreement - Answer: c) Review of the risk assessment with executive management for final input
  3. Who is accountable for ensuring that information is categorized and that specific protective measures are taken? a) The security officer b) Senior management c) The end user d) The custodian - Answer: b) Senior management
  4. Abnormal server communication from inside the organization to external parties may be monitored to:

a) record the trace of advanced persistent threats b) evaluate the process resiliency of server operations c) verify the effectiveness of an intrusion detection system d) support a nonrepudiation framework in e-commerce - Answer: a) record the trace of advanced persistent threats

  1. Which of the following is the BEST way to detect an intruder who successfully penetrates a network before significant damage is inflicted? a) Perform periodic penetration testing b) Establish minimum security baselines c) Implement vendor default settings d) Install a honeypot on the network - Answer: d) Install a honeypot on the network