Free ISACA CISM Exam Braindumps (page: 85)

Which of the following is the MOST effective method of preventing deliberate internal security breaches?

  1. Screening prospective employees
  2. Well-designed firewall system
  3. Well-designed intrusion detection system (IDS)
  4. Biometric security access control

Answer(s): B


Reference:

https://www.techrepublic.com/article/strategies-for-preventing-internal-security-breaches-in-a-growing-business/



A business previously accepted the risk associated with a zero-day vulnerability. The same vulnerability was recently exploited in a high-profile attack on another organization in the same industry. Which of the following should be the information security manager’s FIRST course of action?

  1. Reassess the risk in terms of likelihood and impact
  2. Develop best and worst case scenarios
  3. Report the breach of the other organization to senior management
  4. Evaluate the cost of remediating the vulnerability

Answer(s): A



To effectively manage an organization’s information security risk, it is MOST important to:

  1. periodically identify and correct new systems vulnerabilities
  2. assign risk management responsibility to end users
  3. benchmark risk scenarios against peer organizations
  4. establish and communicate risk tolerance

Answer(s): A



Which of the following is the BEST course of action for the information security manager when residual risk is above the acceptable level of risk?

  1. Perform a cost-benefit analysis
  2. Recommend additional controls
  3. Carry out a risk assessment
  4. Defer to business management

Answer(s): B






Post your Comments and Discuss ISACA CISM exam prep with other Community members:

CISM Exam Discussions & Posts