Q: 11
Which of the following is the BEST indicator of an organization's information security status?
Options
Discussion
B tbh, saw similar in exam reports.
Nah, not C. B tbh since controls audit checks the big picture, others are more point-in-time things.
I'd say B makes the most sense since audits generally look at the overall effectiveness and coverage of security controls. The other options seem more tactical or specific. Not 100% sure though, open to other opinions.
Be respectful. No spam.
Q: 12
Which of the following will provide the MOST guidance when deciding the level of protection for an
information asset?
Options
Discussion
C makes the most sense since you need to tie protection levels to what would actually affect the business. IS program is important but protecting assets is always about avoiding hits to core business functions. Pretty sure that's right, anyone see it differently?
encountered exactly similar question in my exam in my practice tests, pretty sure it’s C.
Why not A? IS program impact seems like it fits here.
Be respectful. No spam.
Q: 13
Regular vulnerability scanning on an organization's internal network has identified that many user
workstations have unpatched versions of software. What is the BEST way for the information security
manager to help senior management understand the related risk?
Options
Discussion
Honestly, ISACA loves reporting and metrics for management. Its A
Be respectful. No spam.
Q: 14
Which of the following MUST be defined in order for an information security manager to evaluate
the appropriateness of controls currently in place?
Options
Discussion
Yeah I agree, C is the key here. You can't really say if your controls are too weak or too strong unless you've got the risk appetite defined first. Policies and frameworks help, but the appetite sets that bar. Pretty confident but let me know if you see it differently.
Its C. You need to know the organization's risk appetite to judge if existing controls are enough or overkill. Without that baseline, there's no way to say what level of risk is acceptable. Pretty sure about this, but open to other takes.
Be respectful. No spam.
Q: 15
Which of the following is the MOST important reason to document information security incidents
that are reported across the organization?
Options
Discussion
C here. Documenting incidents mainly helps us figure out what went wrong so we can stop it happening again. The others are good benefits but not the main reason in most best practices, I think. Agree?
Be respectful. No spam.
Q: 16
An information security team is planning a security assessment of an existing vendor. Which of the
following approaches is MOST helpful for properly scoping the assessment?
Options
Discussion
Its B
B, This matches what I've seen in similar practice questions, since the contract really lays out the security controls you actually expect from the vendor. Super clear wording here.
Be respectful. No spam.
Q: 17
Which of the following is the BEST course of action when an online company discovers a network
attack in progress?
Options
Discussion
Guessing B, unless the segment in question hosts critical shared services for the whole org. Otherwise, isolation fits best practice.
B tbh, had a similar scenario in a mock. Isolation limits the damage without killing everything.
Be respectful. No spam.
Q: 18
Which of the following is the MOST important consideration when establishing an organization's
information security governance committee?
Options
Discussion
Option B, saw a similar setup in a mock exam and picked it then.
Its D, not B. Having all functions represented avoids tunnel vision, B is a common distractor in these ISACA-type questions.
Yeah, D makes sense. If you want governance to work, you need input from every department, not just tech folks.
D
Having members from all key business functions is crucial so the committee gets a full picture of org risks and priorities. Info sec should align with business, not just IT. I’ve seen similar questions emphasize cross-functional input over pure technical knowledge. Pretty sure D fits best here, but open to other takes.
Having members from all key business functions is crucial so the committee gets a full picture of org risks and priorities. Info sec should align with business, not just IT. I’ve seen similar questions emphasize cross-functional input over pure technical knowledge. Pretty sure D fits best here, but open to other takes.
Be respectful. No spam.
Q: 19
Senior management wants to thoroughly test a disaster recovery plan (DRP) for a mission-critical
system. Which of the following would provide the MOST reliable results?
Options
Discussion
I figured it was B here. Since a parallel test runs the system at both sites, it seems pretty solid for reliability to me. Let me know if I'm missing something.
Pretty sure A here since full interruption is the most reliable, though risky. But if the question said "safest" instead of "most reliable," wouldn't that move us to B or C instead?
Be respectful. No spam.
Q: 20
To confirm that a third-party provider complies with an organization's information security
requirements, it is MOST important to ensure:
Options
Discussion
D based on official guide and practice questions I've seen. Right to audit is always flagged as critical for third-party compliance.
B or D? B seems solid since contract clauses can enforce what’s required by policy, which should push compliance, but I get why audit rights (D) are a big deal too. Think some exams trip you up with B as a close trap.
Probably D. Without audit rights, you can't really confirm actual compliance even if all the paperwork looks good.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2