ExamGecko
Home / Isaca / CISM / List of questions
Ask Question

Isaca CISM Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.

Which of the following should be given immediate focus?

Moving to a zero trust access model
Moving to a zero trust access model
Enabling network-level authentication
Enabling network-level authentication
Enhancing cyber response capability
Enhancing cyber response capability
Strengthening endpoint security
Strengthening endpoint security
Suggested answer: D
Explanation:

Strengthening endpoint security is the most immediate focus when shifting to a work-from-home model with an increased need for remote access security, as this reduces the risk of unauthorized access, data leakage, malware infection, and other threats that may compromise the confidentiality, integrity, and availability of the organization's information assets.Moving to a zero trust access model, enabling network-level authentication, and enhancing cyber response capability are also important, but not as urgent as strengthening endpoint security, as they require more time, resources, and planning to implement effectively.Reference= CISM Review Manual 2023, page 1561; CISM Review Questions, Answers & Explanations Manual 2023, page 302; ISACA CISM - iSecPrep, page 153

asked 01/10/2024
federico monaco
35 questions

Question 2

Report Export Collapse

Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?

Defining information stewardship roles
Defining information stewardship roles
Defining security asset categorization
Defining security asset categorization
Assigning information asset ownership
Assigning information asset ownership
Developing a records retention schedule
Developing a records retention schedule
Suggested answer: C
Explanation:

The most important factor to ensuring information stored by an organization is protected appropriately is assigning information asset ownership. Information asset ownership is the process of identifying and assigning the roles and responsibilities of the individuals or groups who have the authority and accountability for the information assets and their protection. Information asset owners are responsible for defining the business value, classification, and security requirements of the information assets, as well as granting the access rights and privileges to the information users and custodians. Information asset owners are also responsible for monitoring and reviewing the security performance and compliance of the information assets, and reporting and resolving any security issues or incidents. By assigning information asset ownership, the organization can ensure that the information assets are properly identified, categorized, protected, and managed according to their importance, sensitivity, and regulatory obligations.

Reference= CISM Review Manual, 16th Edition, Chapter 1: Information Security Governance, Section: Data Classification, page 331; CISM Review Questions, Answers & Explanations Manual, 10th Edition, Question 62, page 572.

asked 01/10/2024
Leandra Felipe
38 questions

Question 3

Report Export Collapse

Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?

Internal security audit
Internal security audit
External security audit
External security audit
Organizational risk appetite
Organizational risk appetite
Business impact analysis (BIA)
Business impact analysis (BIA)
Suggested answer: C
Explanation:

The organizational risk appetite is the best indicator of the comprehensiveness of an information security strategy. The risk appetite defines the level of risk that the organization is willing to accept in pursuit of its objectives. The information security strategy should align with the risk appetite and provide a framework for managing the risks that the organization faces. An internal or external security audit can assess the effectiveness of the information security strategy, but not its comprehensiveness.A business impact analysis (BIA) can identify the critical business processes and assets that need to be protected, but not the overall scope and direction of the information security strategy.Reference= CISM Review Manual 2023, page 361; CISM Practice Quiz2

asked 01/10/2024
Gennadiy Volkov
33 questions

Question 4

Report Export Collapse

Which of the following is the MOST important factor of a successful information security program?

The program follows industry best practices.
The program follows industry best practices.
The program is based on a well-developed strategy.
The program is based on a well-developed strategy.
The program is cost-efficient and within budget,
The program is cost-efficient and within budget,
The program is focused on risk management.
The program is focused on risk management.
Suggested answer: D
Explanation:

A successful information security program is one that aligns with the business objectives and strategy, supports the business processes and functions, and protects the information assets from threats and vulnerabilities. The most important factor of such a program is that it is focused on risk management, which means that it identifies, assesses, treats, and monitors the information security risks that could affect the business continuity, reputation, and value. Risk management helps to prioritize the security activities and resources, allocate the appropriate budget and resources, implement the necessary controls and measures, and evaluate the effectiveness and efficiency of the program. Risk management also enables the program to adapt to the changing business and threat environment, and to continuously improve the security posture and performance.A program that follows industry best practices, is based on a well-developed strategy, and is cost-efficient and within budget are all desirable attributes, but they are not sufficient to ensure the success of the program without a risk management focus.Reference= CISM Review Manual 15th Edition, page 411; CISM Practice Quiz, question 1242

asked 01/10/2024
tho nguyen
37 questions

Question 5

Report Export Collapse

Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?

Incorporate policy statements derived from third-party standards and benchmarks.
Incorporate policy statements derived from third-party standards and benchmarks.
Adhere to a unique corporate privacy and security standard
Adhere to a unique corporate privacy and security standard
Establish baseline standards for all locations and add supplemental standards as required
Establish baseline standards for all locations and add supplemental standards as required
Require that all locations comply with a generally accepted set of industry
Require that all locations comply with a generally accepted set of industry
Suggested answer: C
Explanation:

= Creating a security policy for a global organization subject to varying laws and regulations is a challenging task, as it requires balancing the need for consistency, compliance, and flexibility. The best approach is to establish baseline standards for all locations that reflect the organization's overall security objectives, principles, and requirements. These standards should be aligned with the organization's mission, vision, values, and strategy, as well as with the applicable laws and regulations of each location. The baseline standards should also be reviewed and updated periodically to ensure their relevance and effectiveness. Additionally, supplemental standards can be added as required to address specific issues or risks that may arise in different locations or situations.Supplemental standards should be based on the best practices and lessons learned from the baseline standards, as well as on the feedback and input from the stakeholders of each location.Reference= CISM Review Manual, 16th Edition, page 1001

asked 01/10/2024
Jonaid Alam
36 questions

Question 6

Report Export Collapse

Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?

Lack of encryption for backup data in transit
Lack of encryption for backup data in transit
Undefined or undocumented backup retention policies
Undefined or undocumented backup retention policies
Ineffective alert configurations for backup operations
Ineffective alert configurations for backup operations
Unavailable or corrupt data backups
Unavailable or corrupt data backups
Suggested answer: D
Explanation:

A ransomware incident is a type of cyberattack that encrypts the victim's data and demands a ransom for its decryption. Ransomware can cause significant disruption and damage to critical systems and data, as well as financial losses and reputational harm. To recover from a ransomware incident, the organization needs to have reliable and accessible backups of its data, preferably in an encrypted format. However, if the backups are unavailable or corrupt, the organization will face a major challenge in restoring its data and operations.Therefore, option D is the most challenging factor for the recovery of critical systems and data following a ransomware incident.Reference= CISA MS-ISAC Ransomware Guide1, page 9; How to Write an Incident Response Plan for Ransomware Recovery2.

asked 01/10/2024
Mark Green
45 questions

Question 7

Report Export Collapse

Which of the following change management procedures is MOST likely to cause concern to the information security manager?

Fallback processes are tested the weekend before changes are made
Fallback processes are tested the weekend before changes are made
Users are not notified of scheduled system changes
Users are not notified of scheduled system changes
A manual rather than an automated process is used to compare program versions.
A manual rather than an automated process is used to compare program versions.
The development manager migrates programs into production
The development manager migrates programs into production
Suggested answer: D
Explanation:

The change management procedure that is MOST likely to cause concern to the information security manager is the development manager migrating programs into production, because it involves a high-risk activity that could compromise the confidentiality, integrity, and availability of the information systems and data. Migrating programs into production without proper testing, validation, and approval could introduce errors, vulnerabilities, or conflicts that could affect the performance, functionality, or security of the systems.Fallback processes are tested the weekend before changes are made, users are not notified of scheduled system changes, and a manual rather than an automated process is used to compare program versions are all acceptable change management procedures that do not pose significant risks to the information security manager.Reference= CISM Review Manual, 16th Edition, page 3121; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 1522

asked 01/10/2024
Tym Dom
41 questions

Question 8

Report Export Collapse

Which of the following is an example of risk mitigation?

Purchasing insurance
Purchasing insurance
Discontinuing the activity associated with the risk
Discontinuing the activity associated with the risk
Improving security controls
Improving security controls
Performing a cost-benefit analysis
Performing a cost-benefit analysis
Suggested answer: C
Explanation:

Improving security controls is an example of risk mitigation, which is the process of reducing the likelihood or impact of a risk. Risk mitigation can be achieved by implementing various strategies, such as purchasing insurance, discontinuing the activity associated with the risk, or improving security controls. Purchasing insurance is a form of risk transfer, which is the process of shifting the responsibility or burden of a risk to another party. Discontinuing the activity associated with the risk is a form of risk avoidance, which is the process of eliminating or avoiding a potential source of harm.Performing a cost-benefit analysis is a form of risk evaluation, which is the process of assessing the costs and benefits of different options to manage a risk.Reference= CISM Review Manual, 16th Edition, page 1741; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 802

asked 01/10/2024
jim eagleton
34 questions

Question 9

Report Export Collapse

Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?

Skills required for the incident response team
Skills required for the incident response team
A list of external resources to assist with incidents
A list of external resources to assist with incidents
Service level agreements (SLAs)
Service level agreements (SLAs)
A detailed incident notification process
A detailed incident notification process
Suggested answer: D
Explanation:

A detailed incident notification process is most important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals. The incident notification process defines the roles and responsibilities of the incident response team members, the escalation procedures, the communication channels, the reporting requirements, and the stakeholders to be informed. The incident notification process helps to ensure that the right people are involved in the incident response, that the incident is handled in a timely and efficient manner, and that the relevant information is shared with the appropriate parties. Skills required for the incident response team, a list of external resources to assist with incidents, and service level agreements (SLAs) are also important elements of an incident response plan, but they are not as critical as the incident notification process. Skills required for the incident response team describe the competencies and qualifications of the team members, but they do not specify who should be notified or involved in the incident response. A list of external resources to assist with incidents provides a directory of external parties that can provide support or expertise in the incident response, but it does not define the criteria or process for engaging them.Service level agreements (SLAs) define the expectations and obligations of the service providers and the service recipients in the incident response, but they do not detail the steps or procedures for notifying or escalating incidents.Reference= CISM Review Manual, 16th Edition, pages 191-1921; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 662

asked 01/10/2024
Mike Werts
32 questions

Question 10

Report Export Collapse

The PRIMARY objective of a post-incident review of an information security incident is to:

update the risk profile
update the risk profile
minimize impact
minimize impact
prevent recurrence.
prevent recurrence.
determine the impact
determine the impact
Suggested answer: C
Explanation:

post-incident review of an information security incident is a process that aims to identify the root causes, contributing factors, and lessons learned from the incident, and to implement corrective and preventive actions to avoid or mitigate similar incidents in the future. The primary objective of a post-incident review is to prevent recurrence, as it helps to improve the security posture, awareness, and resilience of the organization. Preventing recurrence also helps to reduce the impact and cost of future incidents, as well as to enhance the reputation and trust of the organization.Updating the risk profile, minimizing impact, and determining the impact are not the primary objectives of a post-incident review, although they may be part of its outcomes or outputs.Reference= CISM Review Manual, 16th Edition, page 1011

asked 01/10/2024
Bhavya AGGARWAL
41 questions
Total 801 questions
Go to page: of 81