ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 15

Question list
Search
Search

A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?

A.
Instruct the vendor to conduct penetration testing.
A.
Instruct the vendor to conduct penetration testing.
Answers
B.
Suspend the connection to the application in the firewall
B.
Suspend the connection to the application in the firewall
Answers
C.
Report the situation to the business owner of the application.
C.
Report the situation to the business owner of the application.
Answers
D.
Initiate the organization's incident response process.
D.
Initiate the organization's incident response process.
Answers
Suggested answer: D

Explanation:

= Initiating the organization's incident response process is the best course of action for the information security manager when a cloud application used by the organization is found to have a serious vulnerability. The incident response process is a set of predefined steps and procedures that aim to contain, analyze, resolve, and learn from security incidents. The information security manager should follow the incident response process to ensure that the vulnerability is properly reported, assessed, mitigated, and communicated to the relevant stakeholders. The incident response process should also involve the cloud service provider (CSP) and the business owner of the application, as they are responsible for the security and functionality of the cloud application. Instructing the vendor to conduct penetration testing, suspending the connection to the application in the firewall, and reporting the situation to the business owner of the application are all possible actions that may be taken as part of the incident response process, but they are not the best initial course of action. Penetration testing may help to identify the root cause and the impact of the vulnerability, but it may also cause further damage or disruption to the cloud application. Suspending the connection to the application in the firewall may prevent unauthorized access or exploitation of the vulnerability, but it may also affect the availability and continuity of the cloud application. Reporting the situation to the business owner of the application is an important step to inform them of the risk and the potential business impact, but it is not sufficient to address the vulnerability and its consequences.Therefore, the information security manager should initiate the incident response process as the best course of action, and then perform the other actions as appropriate based on the incident response plan and the risk assessment.References= CISM Review Manual 2023, page 2111; CISM Practice Quiz2

Which of the following BEST facilitates effective incident response testing?

A.
Including all business units in testing
A.
Including all business units in testing
Answers
B.
Simulating realistic test scenarios
B.
Simulating realistic test scenarios
Answers
C.
Reviewing test results quarterly
C.
Reviewing test results quarterly
Answers
D.
Testing after major business changes
D.
Testing after major business changes
Answers
Suggested answer: B

Explanation:

Effective incident response testing is a process of verifying and validating the incident response plan, procedures, roles, and resources that are designed to respond to and recover from information security incidents. The purpose of testing is to ensure that the incident response team and the organization are prepared, capable, and confident to handle any potential or actual incidents that could affect the business continuity, reputation, and value. The best way to facilitate effective testing is to simulate realistic test scenarios that reflect the most likely or critical threats and vulnerabilities that could cause an incident, and the most relevant or significant impacts and consequences that could result from an incident. Simulating realistic test scenarios can help to evaluate the adequacy, accuracy, and applicability of the incident response plan, procedures, roles, and resources, as well as to identify and address any gaps, weaknesses, or errors that could hinder or compromise the incident response process. Simulating realistic test scenarios can also help to enhance the skills, knowledge, and experience of the incident response team and the organization, as well as to improve the communication, coordination, and collaboration among the stakeholders involved in the incident response process.Simulating realistic test scenarios can also help to measure and report the effectiveness and efficiency of the incident response process, and to provide feedback and recommendations for improvement and optimization.Reference= CISM Review Manual 15th Edition, page 2401; CISM Practice Quiz, question 1362

An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?

A.
Create a business case for a new incident response plan.
A.
Create a business case for a new incident response plan.
Answers
B.
Revise the existing incident response plan.
B.
Revise the existing incident response plan.
Answers
C.
Conduct a gap analysis.
C.
Conduct a gap analysis.
Answers
D.
Assess the impact to the budget,
D.
Assess the impact to the budget,
Answers
Suggested answer: C

Explanation:

Before implementing any changes to the security incident response plan, the information security manager should first conduct a gap analysis to identify the current state of the plan and compare it with the new requirements. A gap analysis is a systematic process of evaluating the differences between the current and desired state of a system, process, or program. A gap analysis can help to identify the strengths and weaknesses of the existing plan, the gaps that need to be addressed, the priorities and dependencies of the actions, and the resources and costs involved. A gap analysis can also help to create a business case for the changes and justify the investment.A gap analysis can be conducted using various methods and tools, such as frameworks, standards, benchmarks, questionnaires, interviews, audits, or tests1234.

Reference=

CISM Review Manual 15th Edition, page 1631

CISM certified information security manager study guide, page 452

How To Conduct An Information Security Gap Analysis3

PROACTIVE DETECTION - GOOD PRACTICES GAP ANALYSIS RECOMMENDATIONS4

Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?

A.
Security policy
A.
Security policy
Answers
B.
Risk management framework
B.
Risk management framework
Answers
C.
Risk appetite
C.
Risk appetite
Answers
D.
Security standards
D.
Security standards
Answers
Suggested answer: C

Explanation:

= Risk appetite is the amount and type of risk that an organization is willing to accept in pursuit of its objectives. It is a key factor that influences the information security strategy and objectives, as well as the selection and implementation of security controls. Risk appetite must be defined in order for an information security manager to evaluate the appropriateness of controls currently in place, as it provides the basis for determining whether the controls are sufficient, excessive, or inadequate to address the risks faced by the organization. The information security manager should align the controls with the risk appetite of the organization, ensuring that the controls are effective, efficient, and economical.Reference= CISM Review Manual 15th Edition, page 29, page 31.

When choosing the best controls to mitigate risk to acceptable levels, the information security manager's decision should be MAINLY driven by:

A.
best practices.
A.
best practices.
Answers
B.
control framework
B.
control framework
Answers
C.
regulatory requirements.
C.
regulatory requirements.
Answers
D.
cost-benefit analysis,
D.
cost-benefit analysis,
Answers
Suggested answer: D

Explanation:

Cost-benefit analysis (CBA) is a method of comparing the costs and benefits of different alternatives for achieving a desired outcome. CBA can help information security managers to choose the best controls to mitigate risk to acceptable levels by providing a rational and objective basis for decision making. CBA can also help information security managers to justify their choices to senior management, stakeholders, and auditors by demonstrating the value and return on investment of the selected controls.CBA can also help information security managers to prioritize and allocate resources for implementing and maintaining the controls12.

CBA involves the following steps12:

Identify the objectives and scope of the analysis

Identify the alternatives and options for achieving the objectives

Identify and quantify the costs and benefits of each alternative

Compare the costs and benefits of each alternative using a common metric or criteria

Select the alternative that maximizes the net benefit or minimizes the net cost

Perform a sensitivity analysis to test the robustness and validity of the results

Document and communicate the results and recommendations

CBA is mainly driven by the information security manager's decision, but it can also take into account other factors such as best practices, control frameworks, and regulatory requirements. However, these factors are not the primary drivers of CBA, as they may not always reflect the specific needs and context of the organization. Best practices are general guidelines or recommendations that may not suit every situation or environment. Control frameworks are standardized models or methodologies that may not cover all aspects or dimensions of information security. Regulatory requirements are mandatory rules or obligations that may not address all risks or threats faced by the organization.Therefore, CBA is the best method to choose the most appropriate and effective controls to mitigate risk to acceptable levels, as it considers the costs and benefits of each control in relation to the organization's objectives, resources, and environment12.Reference=CISM Domain 2: Information Risk Management (IRM) [2022 update],Five Key Considerations When Developing Information Security Risk Treatment Plans

Which of the following MUST happen immediately following the identification of a malware incident?

A.
Preparation
A.
Preparation
Answers
B.
Recovery
B.
Recovery
Answers
C.
Containment
C.
Containment
Answers
D.
Eradication
D.
Eradication
Answers
Suggested answer: C

Explanation:

Containment is the action that MUST happen immediately following the identification of a malware incident because it aims to isolate the affected systems or networks from the rest of the environment and prevent the spread or escalation of the malware. Containment can involve disconnecting the systems or networks from the internet, blocking or filtering certain ports or protocols, or creating separate VLANs or subnets for the isolated systems or networks.Containment is part of the incident response process and should be performed as soon as possible after detecting a malware incident12. Preparation (A) is the phase that happens before the identification of a malware incident, where the organization establishes the incident response plan, team, roles, resources, and tools.Preparation is essential for ensuring the readiness and capability of the organization to respond to malware incidents effectively and efficiently12. Recovery (B) is the phase that happens after the containment and eradication of a malware incident, where the organization restores the normal operations of the systems or networks, verifies the functionality and security of the systems or networks, and implements the preventive and corrective measures to avoid or mitigate future malware incidents.Recovery is the final phase of the incident response process and should be performed after ensuring that the malware incident is fully resolved and the systems or networks are clean and secure12. Eradication (D) is the phase that happens after the containment of a malware incident, where the organization removes the malware and its traces from the systems or networks, identifies the root cause and impact of the malware incident, and collects and preserves the evidence for analysis and investigation.Eradication is an important phase of the incident response process, but it does not happen immediately after the identification of a malware incident12.Reference=1: CISM Review Manual 15th Edition, page 308-3091;2: Cybersecurity Incident Response Exercise Guidance - ISACA2

Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?

A.
Compromise of critical assets via third-party resources
A.
Compromise of critical assets via third-party resources
Answers
B.
Unavailability of services provided by a supplier
B.
Unavailability of services provided by a supplier
Answers
C.
Loss of customers due to unavailability of products
C.
Loss of customers due to unavailability of products
Answers
D.
Unreliable delivery of hardware and software resources by a supplier
D.
Unreliable delivery of hardware and software resources by a supplier
Answers
Suggested answer: A

Explanation:

= A supply chain attack is a type of cyberattack that targets the suppliers or service providers of an organization, rather than the organization itself. The attackers exploit the vulnerabilities or weaknesses in the supply chain to gain access to the organization's network, systems, or data. The attackers may then use the compromised third-party resources to launch further attacks, steal sensitive information, disrupt operations, or damage reputation. Therefore, the most likely risk scenario that emerges from a supply chain attack is the compromise of critical assets via third-party resources. This scenario poses a high threat to the confidentiality, integrity, and availability of the organization's assets, as well as its compliance and trustworthiness. Unavailability of services provided by a supplier, loss of customers due to unavailability of products, and unreliable delivery of hardware and software resources by a supplier are all possible consequences of a supply chain attack, but they are not the most likely risk scenarios. These scenarios may affect the organization's productivity, profitability, and customer satisfaction, but they do not directly compromise the organization's critical assets.Moreover, these scenarios may be caused by other factors besides a supply chain attack, such as natural disasters, human errors, or market fluctuations.Reference= CISM Review Manual 2023, page 1891; CISM Practice Quiz2

An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:

A.
conduct an incident forensic analysis.
A.
conduct an incident forensic analysis.
Answers
B.
fallow the incident response plan
B.
fallow the incident response plan
Answers
C.
notify the business process owner.
C.
notify the business process owner.
Answers
D.
fallow the business continuity plan (BCP).
D.
fallow the business continuity plan (BCP).
Answers
Suggested answer: B

Explanation:

Before classifying the suspected event as a security incident, it is most important for the security manager to follow the incident response plan, which is a predefined set of procedures and guidelines that outline the roles, responsibilities, and actions of the incident management team and the organization in the event of a security event or incident. Following the incident response plan can help to ensure a consistent, coordinated, and effective response to the suspected event, as well as to minimize the impact and damage to the business processes, functions, and assets. Following the incident response plan can also help to determine the nature, scope, and severity of the suspected event, and to decide whether it meets the criteria and threshold for being classified as a security incident that requires further escalation, investigation, and resolution. Following the incident response plan can also help to document and report the incident details, activities, and outcomes, and to provide feedback and recommendations for improvement and optimization of the incident response process and plan.

Conducting an incident forensic analysis, notifying the business process owner, and following the business continuity plan (BCP) are all important steps in the incident response process, but they are not the most important ones before classifying the suspected event as a security incident. Conducting an incident forensic analysis is a technical and detailed process that involves collecting, preserving, analyzing, and presenting evidence related to the incident, and it is usually performed after the incident has been classified, contained, and eradicated. Notifying the business process owner is a communication and notification process that involves informing the relevant stakeholders of the incident status, impact, and actions, and it is usually performed after the incident has been classified and assessed.Following the business continuity plan (BCP) is a recovery and restoration process that involves resuming and restoring the normal business operations and functions after the incident has been resolved and lessons learned have been identified and implemented.Reference= CISM Review Manual 15th Edition, pages 237-2411; CISM Practice Quiz, question 1422

A PRIMARY purpose of creating security policies is to:

A.
define allowable security boundaries.
A.
define allowable security boundaries.
Answers
B.
communicate management's security expectations.
B.
communicate management's security expectations.
Answers
C.
establish the way security tasks should be executed.
C.
establish the way security tasks should be executed.
Answers
D.
implement management's security governance strategy.
D.
implement management's security governance strategy.
Answers
Suggested answer: D

Explanation:

A security policy is a formal statement of the rules and principles that govern the protection of information assets in an organization. A security policy defines the scope, objectives, roles and responsibilities, and standards of the information security program. A primary purpose of creating security policies is to implement management's security governance strategy, which is the framework that guides the direction and alignment of information security with the business goals and objectives. A security policy translates the management's vision and expectations into specific and measurable requirements and controls that can be implemented and enforced by the information security staff and other stakeholders. A security policy also helps to establish the accountability and authority of the information security function and to demonstrate the commitment and support of the senior management for the information security program.

Reference=

CISM Review Manual 15th Edition, page 1631

CISM 2020: IT Security Policies2

CISM domain 1: Information security governance [Updated 2022]3

What is CISM?- Digital Guardian4

Which of the following BEST supports information security management in the event of organizational changes in security personnel?

A.
Formalizing a security strategy and program
A.
Formalizing a security strategy and program
Answers
B.
Developing an awareness program for staff
B.
Developing an awareness program for staff
Answers
C.
Ensuring current documentation of security processes
C.
Ensuring current documentation of security processes
Answers
D.
Establishing processes within the security operations team
D.
Establishing processes within the security operations team
Answers
Suggested answer: C

Explanation:

Ensuring current documentation of security processes is the best way to support information security management in the event of organizational changes in security personnel. Documentation of security processes provides a clear and consistent reference for the roles, responsibilities, procedures, and standards of the information security program. It helps to maintain the continuity and effectiveness of the security operations, as well as the compliance with the security policies and regulations. Documentation of security processes also facilitates the knowledge transfer and training of new or existing security personnel, as well as the communication and collaboration with other stakeholders. By ensuring current documentation of security processes, the information security manager can minimize the impact of organizational changes in security personnel, and ensure a smooth transition and alignment of the security program.Reference= CISM Review Manual 15th Edition, page 43, page 45.

Total 793 questions
Go to page: of 80