ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

IT projects have gone over budget with too many security controls being added post-production. Which of the following would MOST help to ensure that relevant controls are applied to a project?

A.
Involving information security at each stage of project management
A.
Involving information security at each stage of project management
Answers
B.
Identifying responsibilities during the project business case analysis
B.
Identifying responsibilities during the project business case analysis
Answers
C.
Creating a data classification framework and providing it to stakeholders
C.
Creating a data classification framework and providing it to stakeholders
Answers
D.
Providing stakeholders with minimum information security requirements
D.
Providing stakeholders with minimum information security requirements
Answers
Suggested answer: A

Explanation:

The best way to ensure that relevant controls are applied to a project is to involve information security at each stage of project management. This will help to identify and address the security risks and requirements of the project from the beginning, and to integrate security controls into the project design, development, testing, and implementation. This will also help to avoid adding unnecessary or ineffective controls post-production, which can increase the project cost and complexity, and reduce the project performance and quality. By involving information security at each stage of project management, the information security manager can ensure that the project delivers the expected security value and aligns with the organization's security strategy and objectives.Reference= CISM Review Manual 15th Edition, page 41.

Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?

A.
Establish key risk indicators (KRIs).
A.
Establish key risk indicators (KRIs).
Answers
B.
Use quantitative risk assessment methods.
B.
Use quantitative risk assessment methods.
Answers
C.
Provide regular reporting on risk treatment to senior management
C.
Provide regular reporting on risk treatment to senior management
Answers
D.
Require steering committee approval of risk treatment plans.
D.
Require steering committee approval of risk treatment plans.
Answers
Suggested answer: D

Explanation:

= Requiring steering committee approval of risk treatment plans is the best way to help ensure an organization's risk appetite will be considered as part of the risk treatment process because the steering committee is composed of senior management and key stakeholders who are responsible for defining and communicating the risk appetite and ensuring that it is aligned with the business objectives and strategy. The steering committee can review and approve the risk treatment plans proposed by the information security manager and ensure that they are consistent with the risk appetite and the risk tolerance levels. The steering committee can also monitor and evaluate the effectiveness of the risk treatment plans and provide feedback and guidance to the information security manager. Establishing key risk indicators (KRIs), using quantitative risk assessment methods, and providing regular reporting on risk treatment to senior management are not the best ways to help ensure an organization's risk appetite will be considered as part of the risk treatment process, although they may be useful tools and techniques to support the risk management process. KRIs are metrics that measure the level of risk exposure and the performance of risk controls. Quantitative risk assessment methods are techniques that use numerical values and probabilities to estimate the likelihood and impact of risk events. Regular reporting on risk treatment to senior management is a way to communicate the status and results of the risk treatment process and to obtain feedback and support from senior management. However, none of these methods can ensure that the risk treatment plans are approved and aligned with the risk appetite, which is the role of the steering committee.Reference= CISM Review Manual 2023, Chapter 2, Section 2.4.3, page 76; CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, Question ID: 121.

Which of the following would BEST ensure that security is integrated during application development?

A.
Employing global security standards during development processes
A.
Employing global security standards during development processes
Answers
B.
Providing training on secure development practices to programmers
B.
Providing training on secure development practices to programmers
Answers
C.
Performing application security testing during acceptance testing
C.
Performing application security testing during acceptance testing
Answers
D.
Introducing security requirements during the initiation phase
D.
Introducing security requirements during the initiation phase
Answers
Suggested answer: D

Explanation:

Introducing security requirements during the initiation phase would BEST ensure that security is integrated during application development because it would allow the security objectives and controls to be defined and aligned with the business needs and risk appetite before any design or coding is done.This would also facilitate the security by design approach, which is the most effective method to enhance the security of applications and application development activities1.Introducing security requirements early would also enable the collaboration between security professionals and developers, the identification and specification of security architectures, and the integration and testing of security controls throughout the development life cycle2. Employing global security standards during development processes (A) would help to ensure the consistency and quality of security practices, but it would not necessarily ensure that security is integrated during application development. Providing training on secure development practices to programmers (B) would help to raise the awareness and skills of developers, but it would not ensure that security is integrated during application development. Performing application security testing during acceptance testing would help to verify the security of the application before deployment, but it would not ensure that security is integrated during application development.It would also be too late to identify and remediate any security issues that could have been prevented or mitigated earlier in the development process.Reference=1: Five Key Components of an Application Security Program - ISACA1;2: CISM Domain -- Information Security Program Development | Infosec2

Which of the following is MOST effective in monitoring an organization's existing risk?

A.
Periodic updates to risk register
A.
Periodic updates to risk register
Answers
B.
Risk management dashboards
B.
Risk management dashboards
Answers
C.
Security information and event management (SIEM) systems
C.
Security information and event management (SIEM) systems
Answers
D.
Vulnerability assessment results
D.
Vulnerability assessment results
Answers
Suggested answer: B

Explanation:

Risk management dashboards are the MOST effective in monitoring an organization's existing risk because they provide a visual and interactive representation of the key risk indicators (KRIs) and metrics that reflect the current risk posture and performance of the organization.Risk management dashboards can help to communicate the risk information to various stakeholders, identify trends and patterns, compare actual results with targets and thresholds, and support decision making and risk response12. Periodic updates to risk register (A) are important to maintain the accuracy and relevance of the risk information, but they are not the most effective in monitoring the existing risk because they do not provide a real-time or dynamic view of the risk situation. Security information and event management (SIEM) systems are effective in monitoring the security events and incidents that may indicate potential or actual threats to the organization, but they are not the most effective in monitoring the existing risk because they do not provide a comprehensive or holistic view of the risk context and impact.Vulnerability assessment results (D) are effective in monitoring the weaknesses and exposures of the organization's assets and systems, but they are not the most effective in monitoring the existing risk because they do not provide a quantitative or qualitative measure of the risk likelihood and consequence.Reference=1: CISM Review Manual 15th Edition, page 316-3171;2: CISM Domain 2: Information Risk Management (IRM) [2022 update]2

Which of the following will BEST facilitate the integration of information security governance into enterprise governance?

A.
Developing an information security policy based on risk assessments
A.
Developing an information security policy based on risk assessments
Answers
B.
Establishing an information security steering committee
B.
Establishing an information security steering committee
Answers
C.
Documenting the information security governance framework
C.
Documenting the information security governance framework
Answers
D.
Implementing an information security awareness program
D.
Implementing an information security awareness program
Answers
Suggested answer: B

Explanation:

Establishing an information security steering committee is the best way to facilitate the integration of information security governance into enterprise governance. The information security steering committee is a cross-functional group of senior managers who provide strategic direction, oversight, and support for the information security program. The committee ensures that the information security strategy is aligned with the enterprise strategy, objectives, and risk appetite. The committee also fosters collaboration and communication among various stakeholders and promotes a culture of security awareness and accountability. Developing an information security policy, documenting the information security governance framework, and implementing an information security awareness program are all important activities for implementing and maintaining information security governance, but they do not necessarily facilitate its integration into enterprise governance.These activities may be initiated or endorsed by the information security steering committee, but they are not sufficient to ensure that information security governance is embedded into the enterprise governance structure and processes.Reference= CISM Review Manual 2023, page 341; CISM Practice Quiz2

Of the following, who is in the BEST position to evaluate business impacts?

A.
Senior management
A.
Senior management
Answers
B.
Information security manager
B.
Information security manager
Answers
C.
IT manager
C.
IT manager
Answers
D.
Process manager
D.
Process manager
Answers
Suggested answer: D

Explanation:

The process manager is the person who is responsible for overseeing and managing the business processes and functions that are essential for the organization's operations and objectives. The process manager has the most direct and detailed knowledge of the inputs, outputs, dependencies, resources, and performance indicators of the business processes and functions. Therefore, the process manager is in the best position to evaluate the business impacts of a disruption or an incident that affects the availability, integrity, or confidentiality of the information assets and systems that support the business processes and functions. The process manager can identify and quantify the potential losses, damages, or consequences that could result from the disruption or incident, such as revenue loss, customer dissatisfaction, regulatory non-compliance, reputational harm, or legal liability.The process manager can also provide input and feedback to the information security manager and the senior management on the business continuity and disaster recovery plans, the risk assessment and treatment, and the security controls and measures that are needed to protect and recover the business processes and functions.Reference= CISM Review Manual 15th Edition, page 2301; CISM Practice Quiz, question 1302

In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:

A.
change activities are documented.
A.
change activities are documented.
Answers
B.
the rationale for acceptance is periodically reviewed.
B.
the rationale for acceptance is periodically reviewed.
Answers
C.
the acceptance is aligned with business strategy.
C.
the acceptance is aligned with business strategy.
Answers
D.
compliance with the risk acceptance framework.
D.
compliance with the risk acceptance framework.
Answers
Suggested answer: B

Explanation:

= In an organization with a rapidly changing environment, the information security risk landscape may also change frequently due to new threats, vulnerabilities, impacts, or controls. Therefore, the information security manager should ensure that the risk acceptance decisions made by the business management are periodically reviewed to verify that they are still valid and aligned with the current risk appetite and tolerance of the organization. The rationale for acceptance should be documented and updated as necessary to reflect the changes in the risk environment and the business objectives. The information security manager should also monitor the accepted risks and report any deviations or issues to the business management and the senior management.

Reference=

CISM Review Manual 15th Edition, page 1131

CISM Review Questions, Answers & Explanations Manual 9th Edition, page 482

CISM Domain 2: Information Risk Management (IRM) [2022 update]3

Management decisions concerning information security investments will be MOST effective when they are based on:

A.
a process for identifying and analyzing threats and vulnerabilities.
A.
a process for identifying and analyzing threats and vulnerabilities.
Answers
B.
an annual loss expectancy (ALE) determined from the history of security events,
B.
an annual loss expectancy (ALE) determined from the history of security events,
Answers
C.
the reporting of consistent and periodic assessments of risks.
C.
the reporting of consistent and periodic assessments of risks.
Answers
D.
the formalized acceptance of risk analysis by management,
D.
the formalized acceptance of risk analysis by management,
Answers
Suggested answer: C

Explanation:

Management decisions concerning information security investments will be most effective when they are based on the reporting of consistent and periodic assessments of risks. This will help management to understand the current and emerging threats, vulnerabilities, and impacts that affect the organization's information assets and business processes. It will also help management to prioritize the allocation of resources and funding for the most critical and cost-effective security controls and solutions. The reporting of consistent and periodic assessments of risks will also enable management to monitor the performance and effectiveness of the information security program, and to adjust the security strategy and objectives as needed.Reference= CISM Review Manual 15th Edition, page 28.

Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?

A.
Availability of web application firewall logs.
A.
Availability of web application firewall logs.
Answers
B.
Capability of online virtual machine analysis
B.
Capability of online virtual machine analysis
Answers
C.
Availability of current infrastructure documentation
C.
Availability of current infrastructure documentation
Answers
D.
Capability to take a snapshot of virtual machines
D.
Capability to take a snapshot of virtual machines
Answers
Suggested answer: D

Explanation:

A snapshot is a point-in-time copy of the state of a virtual machine (VM) that can be used to restore the VM to a previous state in case of a security incident or a disaster. A snapshot can capture the VM's disk, memory, and device configuration, allowing for a quick and easy recovery of the VM's data and functionality. Snapshots can also be used to create backups, clones, or replicas of VMs for testing, analysis, or migration purposes. Snapshots are a common service offering in Infrastructure as a Service (IaaS) models, where customers can provision and manage VMs on demand from a cloud service provider (CSP).A CSP that offers the capability to take snapshots of VMs can assist customers when recovering from a security incident by providing them with the following benefits12:

Faster recovery time: Snapshots can reduce the downtime and data loss caused by a security incident by allowing customers to quickly revert their VMs to a known good state. Snapshots can also help customers avoid the need to reinstall or reconfigure their VMs after an incident, saving time and resources.

Easier incident analysis: Snapshots can enable customers to perform online or offline analysis of their VMs after an incident, without affecting the production environment. Customers can use snapshots to examine the VM's disk, memory, and logs for evidence of compromise, root cause analysis, or forensic investigation. Customers can also use snapshots to test and validate their incident response plans or remediation actions before applying them to the production VMs.

Enhanced security posture: Snapshots can improve the security posture of customers by enabling them to implement best practices such as backup and restore, disaster recovery, and business continuity. Snapshots can help customers protect their VMs from accidental or malicious deletion, corruption, or modification, as well as from environmental or technical disruptions. Snapshots can also help customers comply with regulatory or contractual requirements for data retention, availability, or integrity.Reference=What is Disaster Recovery as a Service? | CSA - Cloud Security Alliance,What Is Cloud Incident Response (IR)? CrowdStrike

When developing an asset classification program, which of the following steps should be completed FIRST?

A.
Categorize each asset.
A.
Categorize each asset.
Answers
B.
Create an inventory.
B.
Create an inventory.
Answers
C.
Create a business case for a digital rights management tool.
C.
Create a business case for a digital rights management tool.
Answers
D.
Implement a data loss prevention (OLP) system.
D.
Implement a data loss prevention (OLP) system.
Answers
Suggested answer: B

Explanation:

Creating an inventory is the FIRST step in developing an asset classification program because it helps to identify and list all the information systems assets of the organization that need to be protected and classified. An inventory should include the asset name, description, owner, custodian, location, type, value, and other relevant attributes.Creating an inventory also enables the establishment of the ownership and custody of the assets, which are essential for defining the roles and responsibilities for asset protection and classification12. Categorizing each asset (A) is a subsequent step in developing an asset classification program, after creating an inventory. Categorizing each asset involves assigning a security level or category to each asset based on its value, sensitivity, and criticality to the organization.The security level or category determines the protection level and controls required for each asset12. Creating a business case for a digital rights management tool is not a step in developing an asset classification program, but rather a possible outcome or recommendation based on the asset classification results.A digital rights management tool is a type of control that can help to enforce the security policies and objectives for the classified assets, such as preventing unauthorized access, copying, or distribution of the assets3. Implementing a data loss prevention (DLP) system (D) is also not a step in developing an asset classification program, but rather a possible outcome or recommendation based on the asset classification results.A DLP system is a type of control that can help to monitor, detect, and prevent the loss or leakage of the classified assets, such as through email, web, or removable media4.Reference=1: CISM Review Manual 15th Edition, page 77-781;2: IT Asset Valuation, Risk Assessment and Control Implementation Model - ISACA2;3: What is Digital Rights Management?- Definition from Techopedia3;4: What is Data Loss Prevention (DLP)?- Definition from Techopedia4

Total 793 questions
Go to page: of 80