ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 11

Question list
Search
Search

Which of the following is the BEST indication of an effective information security awareness training program?

A.
An increase in the frequency of phishing tests
A.
An increase in the frequency of phishing tests
Answers
B.
An increase in positive user feedback
B.
An increase in positive user feedback
Answers
C.
An increase in the speed of incident resolution
C.
An increase in the speed of incident resolution
Answers
D.
An increase in the identification rate during phishing simulations
D.
An increase in the identification rate during phishing simulations
Answers
Suggested answer: D

Explanation:

An effective information security awareness training program should aim to improve the knowledge, skills and behavior of the employees regarding information security. One of the ways to measure the effectiveness of such a program is to conduct phishing simulations, which are mock phishing attacks that test the employees' ability to identify and report phishing emails. An increase in the identification rate during phishing simulations indicates that the employees have learned how to recognize and avoid phishing attempts, which is one of the common threats to information security. Therefore, this is the best indication of an effective information security awareness training program among the given options.

The other options are not as reliable or relevant as indicators of an effective information security awareness training program. An increase in the frequency of phishing tests does not necessarily mean that the employees are learning from them or that the tests are aligned with the learning objectives of the program. An increase in positive user feedback may reflect the satisfaction or engagement of the employees with the program, but it does not measure the actual learning outcomes or behavior changes. An increase in the speed of incident resolution may be influenced by other factors, such as the availability and efficiency of the incident response team, the severity and complexity of the incidents, or the tools and processes used for incident management. Moreover, the speed of incident resolution does not reflect the prevention or reduction of incidents, which is a more desirable goal of an information security awareness training program.Reference=

CISM Review Manual, 16th Edition, ISACA, 2022, pp. 201-202, 207-208.

CISM Questions, Answers & Explanations Database, ISACA, 2022, QID 1001.

Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?

A.
Establishing risk metrics
A.
Establishing risk metrics
Answers
B.
Training on risk management procedures
B.
Training on risk management procedures
Answers
C.
Reporting on documented deficiencies
C.
Reporting on documented deficiencies
Answers
D.
Assigning a risk owner
D.
Assigning a risk owner
Answers
Suggested answer: D

Explanation:

Assigning a risk owner is the best way to ensure a risk response plan will be developed and executed in a timely manner, because a risk owner is responsible for monitoring, controlling, and reporting on the risk, as well as implementing the appropriate risk response actions. A risk owner should have the authority, accountability, and resources to manage the risk effectively. Establishing risk metrics, training on risk management procedures, and reporting on documented deficiencies are all important aspects of risk management, but they do not guarantee that a risk response plan will be executed promptly and properly. Risk metrics help to measure and communicate the risk level and performance, but they do not assign any responsibility or action. Training on risk management procedures helps to increase the awareness and competence of the staff involved in risk management, but it does not ensure that they will follow the procedures or have the authority to do so. Reporting on documented deficiencies helps to identify and communicate the gaps and weaknesses in the risk management process, but it does not provide any solutions or corrective actions.Reference= CISM Review Manual, 16th Edition, ISACA, 2021, pages 125-126, 136-137.

Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?

A.
Providing ongoing training to the incident response team
A.
Providing ongoing training to the incident response team
Answers
B.
Implementing proactive systems monitoring
B.
Implementing proactive systems monitoring
Answers
C.
Implementing a honeypot environment
C.
Implementing a honeypot environment
Answers
D.
Updating information security awareness materials
D.
Updating information security awareness materials
Answers
Suggested answer: B

Explanation:

= Proactive systems monitoring is the best method to protect against emerging APT actors because it can help detect and respond to anomalous or malicious activities on the network, such as unauthorized access, data exfiltration, malware infection, or command and control communication. Proactive systems monitoring can also help identify the source, scope, and impact of an APT attack, as well as provide evidence for forensic analysis and remediation. Proactive systems monitoring can include tools such as intrusion detection and prevention systems (IDPS), security information and event management (SIEM) systems, network traffic analysis, endpoint detection and response (EDR), and threat intelligence feeds.

Reference= CISM Review Manual 15th Edition, page 201-2021; CISM Practice Quiz, question 922

Which of the following is MOST important in increasing the effectiveness of incident responders?

A.
Communicating with the management team
A.
Communicating with the management team
Answers
B.
Integrating staff with the IT department
B.
Integrating staff with the IT department
Answers
C.
Testing response scenarios
C.
Testing response scenarios
Answers
D.
Reviewing the incident response plan annually
D.
Reviewing the incident response plan annually
Answers
Suggested answer: C

Explanation:

= Testing response scenarios is the most important factor in increasing the effectiveness of incident responders, as it allows them to practice their skills, identify gaps and weaknesses, evaluate the adequacy and feasibility of the incident response plan, and improve their coordination and communication. Testing response scenarios can also help to enhance the confidence and readiness of the incident responders, as well as to measure their performance and compliance with the policies and procedures. Testing response scenarios can be done through various methods, such as tabletop exercises, simulations, drills, or full-scale exercises, depending on the scope, objectives, and complexity of the scenarios.

The other options are not as important as testing response scenarios, although they may also contribute to the effectiveness of incident responders. Communicating with the management team is important to ensure that the incident responders have the necessary support, resources, and authority to carry out their tasks, as well as to report the status and outcomes of the incident response. However, communication alone is not sufficient to increase the effectiveness of incident responders, as they also need to have the relevant knowledge, skills, and experience to handle the incidents. Integrating staff with the IT department may help to facilitate the collaboration and information sharing between the incident responders and the IT staff, who may have the technical expertise and access to the systems and data involved in the incidents. However, integration alone is not enough to increase the effectiveness of incident responders, as they also need to have the appropriate roles, responsibilities, and processes to manage the incidents. Reviewing the incident response plan annually is important to ensure that the plan is updated and aligned with the current risks, threats, and business requirements, as well as to incorporate the lessons learned and best practices from previous incidents. However, reviewing the plan alone is not enough to increase the effectiveness of incident responders, as they also need to test and validate the plan in realistic scenarios and conditions.Reference=

CISM Review Manual, 16th Edition, ISACA, 2022, pp. 223-225, 230-231.

CISM Questions, Answers & Explanations Database, ISACA, 2022, QID 1004.

Which of the following activities is designed to handle a control failure that leads to a breach?

A.
Risk assessment
A.
Risk assessment
Answers
B.
Incident management
B.
Incident management
Answers
C.
Root cause analysis
C.
Root cause analysis
Answers
D.
Vulnerability management
D.
Vulnerability management
Answers
Suggested answer: B

Explanation:

Incident management is the activity designed to handle a control failure that leads to a breach. Incident management is the process of identifying, analyzing, responding to, and learning from security incidents that may compromise the confidentiality, integrity, or availability of information assets. Incident management aims to minimize the impact of a breach, restore normal operations as quickly as possible, and prevent or reduce the likelihood of recurrence. Incident management involves several steps, such as:

Establishing an incident response team with clear roles and responsibilities

Developing and maintaining an incident response plan that defines the procedures, tools, and resources for handling incidents

Implementing detection and reporting mechanisms to identify and communicate incidents

Performing triage and analysis to assess the scope, severity, and root cause of incidents

Containing and eradicating the threat and preserving evidence for investigation and legal purposes

Recovering and restoring the affected systems and data to a secure state

Evaluating and improving the incident response process and controls based on lessons learned and best practices

Reference= CISM Review Manual, 16th Edition, ISACA, 2021, pages 223-232.

Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?

A.
Documentation of control procedures
A.
Documentation of control procedures
Answers
B.
Standardization of compliance requirements
B.
Standardization of compliance requirements
Answers
C.
Automation of controls
C.
Automation of controls
Answers
D.
Integration of assurance efforts
D.
Integration of assurance efforts
Answers
Suggested answer: B

Explanation:

= Standardization of compliance requirements is the best approach to reduce unnecessary duplication of compliance activities, as it allows for a common understanding of the objectives and expectations of various stakeholders, such as regulators, auditors, customers, and business partners.Standardization also facilitates the alignment of compliance activities with the organization's risk appetite and tolerance, and enables the identification and elimination of redundant or conflicting controls.Reference= CISM Review Manual, 27th Edition, page 721; CISM Review Questions, Answers & Explanations Database, 12th Edition, question 952

Learn more:

Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?

A.
The security strategy is promoted.
A.
The security strategy is promoted.
Answers
B.
Fewer security incidents are reported.
B.
Fewer security incidents are reported.
Answers
C.
Security behavior is improved.
C.
Security behavior is improved.
Answers
D.
More security incidents are detected.
D.
More security incidents are detected.
Answers
Suggested answer: C

Explanation:

The greatest benefit of conducting an organization-wide security awareness program is to improve the security behavior of the employees, contractors, partners, and other stakeholders who interact with the organization's information assets. Security behavior refers to the actions and decisions that affect the confidentiality, integrity, and availability of information, such as following the security policies and procedures, reporting security incidents, avoiding risky practices, and applying security controls. By improving the security behavior, the organization can reduce the human-related risks and vulnerabilities, enhance the security culture and awareness, and support the security strategy and objectives.

The other options are not as beneficial as improving the security behavior, although they may also be outcomes or objectives of a security awareness program. Promoting the security strategy is important to communicate the vision, mission, and goals of the security function, as well as to align the security activities with the business needs and expectations. However, promoting the security strategy alone is not enough to ensure its implementation and effectiveness, as it also requires the involvement and commitment of the stakeholders, especially the senior management. Reporting fewer security incidents may indicate a lower level of security breaches or threats, but it may also reflect a lack of detection, reporting, or awareness mechanisms. Moreover, reporting fewer security incidents is not a reliable measure of the security performance or maturity, as it does not account for the impact, severity, or root causes of the incidents. Detecting more security incidents may indicate a higher level of security monitoring, alerting, or awareness capabilities, but it may also reflect a higher level of security exposures or attacks. Moreover, detecting more security incidents is not a desirable goal of a security awareness program, as it also implies a higher level of security incidents that need to be responded to and resolved.Reference=

CISM Review Manual, 16th Edition, ISACA, 2022, pp. 201-202, 207-208.

CISM Questions, Answers & Explanations Database, ISACA, 2022, QID 1006.

The Benefits of Information Security and Privacy Awareness Training Programs, ISACA Journal, Volume 1, 2019,1.

An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?

A.
Enforce the policy.
A.
Enforce the policy.
Answers
B.
Modify the policy.
B.
Modify the policy.
Answers
C.
Present the risk to senior management.
C.
Present the risk to senior management.
Answers
D.
Create an exception for the deviation.
D.
Create an exception for the deviation.
Answers
Suggested answer: C

Explanation:

The information security manager's best course of action is to present the risk to senior management, because this is a case of conflicting objectives and priorities between the information security team and the business management. The information security manager should explain the potential impact and likelihood of a security breach due to the violation of the access policy, as well as the possible legal, regulatory, and reputational consequences. The information security manager should also provide alternative solutions that can achieve both operational efficiency and security compliance, such as implementing single sign-on, role-based access control, or multi-factor authentication. The information security manager should not enforce the policy without senior management's approval, because this could cause operational disruption and business dissatisfaction. The information security manager should not modify the policy without a proper risk assessment and approval process, because this could weaken the security posture and expose the organization to more threats. The information security manager should not create an exception for the deviation without a formal risk acceptance and documentation process, because this could create inconsistency and ambiguity in the policy enforcement and accountability.Reference= CISM Review Manual, 16th Edition, ISACA, 2021, pages 127-128, 138-139, 143-144.

Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?

A.
Each process is assigned to a responsible party.
A.
Each process is assigned to a responsible party.
Answers
B.
The contact list is regularly updated.
B.
The contact list is regularly updated.
Answers
C.
Minimum regulatory requirements are maintained.
C.
Minimum regulatory requirements are maintained.
Answers
D.
Senior management approval has been documented.
D.
Senior management approval has been documented.
Answers
Suggested answer: B

Explanation:

= The contact list is the most important element of the escalation procedures for an incident response plan, as it ensures that the appropriate stakeholders are notified and involved in the incident management process. A contact list should include the names, roles, responsibilities, phone numbers, email addresses, and backup contacts of the key personnel involved in the incident response, such as the incident response team, senior management, legal counsel, public relations, law enforcement, and external service providers.The contact list should be regularly updated and tested to ensure its accuracy and availability123.Reference=

1: Information Security Incident Response Escalation Guideline2, page 4

2: A Practical Approach to Incident Management Escalation1, section ''Step 2: Log the escalation and record the related incident problems that occurred''

3: Computer Security Incident Handling Guide4, page 18

A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:

A.
incident has been confirmed.
A.
incident has been confirmed.
Answers
B.
incident has been contained.
B.
incident has been contained.
Answers
C.
potential incident has been logged.
C.
potential incident has been logged.
Answers
D.
incident has been mitigated.
D.
incident has been mitigated.
Answers
Suggested answer: A

Explanation:

= The information security manager should contact the information owner after the incident has been confirmed, as this is the first step of the incident response process. The information owner is the person who has the authority and responsibility for the information asset that is affected by the incident. The information owner needs to be informed of the incident as soon as possible, as they may have to make decisions or take actions regarding the protection, recovery, or restoration of the information asset. The information owner may also have to communicate with other stakeholders, such as the business units, customers, regulators, or media, depending on the nature and impact of the incident.

The other options are not the correct time to contact the information owner, as they occur later in the incident response process. Contacting the information owner after the incident has been contained, mitigated, or logged may delay the notification and escalation of the incident, as well as the involvement and collaboration of the information owner. Moreover, contacting the information owner after the incident has been contained or mitigated may imply that the incident response team has already taken actions that may affect the information asset without the consent or approval of the information owner. Contacting the information owner after a potential incident has been logged may cause unnecessary alarm or confusion, as the potential incident may not be a real or significant incident, or it may not affect the information owner's asset.Reference=

CISM Review Manual, 16th Edition, ISACA, 2022, pp. 219-220, 226-227.

CISM Questions, Answers & Explanations Database, ISACA, 2022, QID 1009.

Total 793 questions
Go to page: of 80