ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 19

Question list
Search
Search

A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?

A.
Prevent the user from using personal mobile devices.
A.
Prevent the user from using personal mobile devices.
Answers
B.
Report the incident to the police.
B.
Report the incident to the police.
Answers
C.
Wipe the device remotely.
C.
Wipe the device remotely.
Answers
D.
Remove user's access to corporate data.
D.
Remove user's access to corporate data.
Answers
Suggested answer: C

Explanation:

Wiping the device remotely is the best option to minimize the risk of data exposure from a stolen personal mobile device. This action will erase all the data stored on the device, including the sensitive corporate data, and prevent unauthorized access or misuse. Wiping the device remotely can be done using enterprise mobility management (EMM) or mobile device management (MDM) tools that allow administrators to remotely manage and secure mobile devices. Alternatively, some mobile devices have built-in features that allow users to wipe their own devices remotely using another device or a web portal.

Preventing the user from using personal mobile devices is not a feasible option, as it may affect the user's productivity and convenience. Moreover, this option does not address the immediate risk of data exposure from the stolen device.

Reporting the incident to the police is a good practice, but it does not guarantee that the device will be recovered or that the data will be protected. The police may not have the resources or the authority to track down the device or access it.

Removing the user's access to corporate data is a preventive measure that can limit the damage caused by a stolen device, but it does not eliminate the risk of data exposure from the data already stored on the device. The user may have cached or downloaded data that can still be accessed by an attacker even if the user's access is revoked.Reference=

Guidelines for Managing the Security of Mobile Devices in the Enterprise NIST Special Publication, Section 3.1.11, page 3-8

CISM Review Manual, Chapter 3, page 121

Mobile device security - CISM Certification Domain 2: Information Risk Management Video Boot Camp 2019, Section 3.3, 00:03:10

Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?

A.
Regulatory requirements are being met.
A.
Regulatory requirements are being met.
Answers
B.
Internal compliance requirements are being met.
B.
Internal compliance requirements are being met.
Answers
C.
Risk management objectives are being met.
C.
Risk management objectives are being met.
Answers
D.
Business needs are being met.
D.
Business needs are being met.
Answers
Suggested answer: D

Explanation:

The primary purpose of business continuity and disaster recovery plans is to ensure that the organization can resume its critical business functions within the stated recovery time objectives (RTOs) after a disruptive event. RTOs are based on the business needs and the impact analysis of each function or process. Therefore, meeting the business needs is the best indicator that the plans are effective.Regulatory requirements, internal compliance requirements, and risk management objectives are important factors that influence the development and testing of the plans, but they are not the ultimate measure of their effectiveness.Reference= CISM Certified Information Security Manager Study Guide, Chapter 9: Business Continuity and Disaster Recovery, page 3071; CISM Foundations: Module 4 Course, Part Two: Business Continuity and Disaster Recovery Plans2; Imperva, Business Continuity & Disaster Recovery Planning (BCP & DRP)3

Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?

A.
Adopt the cloud provider's incident response procedures.
A.
Adopt the cloud provider's incident response procedures.
Answers
B.
Transfer responsibility for incident response to the cloud provider.
B.
Transfer responsibility for incident response to the cloud provider.
Answers
C.
Continue using the existing incident response procedures.
C.
Continue using the existing incident response procedures.
Answers
D.
Revise incident response procedures to encompass the cloud environment.
D.
Revise incident response procedures to encompass the cloud environment.
Answers
Suggested answer: D

Explanation:

The best approach to incident response for an organization migrating to a cloud-based solution is to revise the existing incident response procedures to encompass the cloud environment. This is because the cloud environment introduces new challenges and risks that may not be adequately addressed by the current procedures. For example, the cloud provider may have different roles and responsibilities, service level agreements, notification and escalation processes, data protection and privacy requirements, and legal and regulatory obligations than the organization. Therefore, the organization should review and update its incident response procedures to align with the cloud provider's policies and practices, as well as the organization's business objectives and risk appetite. The organization should also ensure that the incident response team members are trained and aware of the changes in the procedures and the cloud environment.

The other options are not the best approaches because they do not consider the specific characteristics and implications of the cloud environment. Adopting the cloud provider's incident response procedures may not be feasible or desirable, as the organization may have different needs and expectations than the cloud provider. Transferring responsibility for incident response to the cloud provider may not be possible or advisable, as the organization may still retain some accountability and liability for the security and availability of its data and services in the cloud. Continuing to use the existing incident response procedures may not be effective or efficient, as the procedures may not cover the scenarios and issues that may arise in the cloud environment.Reference=

CISM Review Manual (Digital Version)1, Chapter 4: Information Security Incident Management, pages 191-192, 195-196, 199-200.

Cloud Incident Response Framework -- A Quick Guide2, pages 3-4, 6-7, 9-10.

CISM ITEM DEVELOPMENT GUIDE3, page 18, Question 1.

Which of the following is the BEST indication of effective information security governance?

A.
Information security is considered the responsibility of the entire information security team.
A.
Information security is considered the responsibility of the entire information security team.
Answers
B.
Information security controls are assigned to risk owners.
B.
Information security controls are assigned to risk owners.
Answers
C.
Information security is integrated into corporate governance.
C.
Information security is integrated into corporate governance.
Answers
D.
Information security governance is based on an external security framework.
D.
Information security governance is based on an external security framework.
Answers
Suggested answer: C

Explanation:

Information security governance (ISG) is the process of establishing and maintaining a framework to provide assurance that information security strategies are aligned with and support business objectives, are consistent with applicable laws and regulations through adherence to policies and internal controls, and provide assignment of responsibility, all in an effort to manage risk1.Effective ISG ensures that information security is integrated into corporate governance and is considered an essential component of enterprise governance2.Information security is not just the responsibility of the information security team, but of all stakeholders in the organization3.Information security controls are not assigned to risk owners, but to control owners who are accountable for implementing and maintaining the controls4.Information security governance is not based on an external security framework, but on the organization's own objectives, risk appetite, and compliance requirements.Reference=1: CISM Review Manual (Digital Version), page 32: CISM Review Manual (Digital Version), page 43: CISM Review Manual (Digital Version), page 54: CISM Review Manual (Digital Version), page 14 : CISM Review Manual (Digital Version), page 16

Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?

A.
Verify that information security requirements are included in the contract.
A.
Verify that information security requirements are included in the contract.
Answers
B.
Request customer references from the vendor.
B.
Request customer references from the vendor.
Answers
C.
Require vendors to complete information security questionnaires.
C.
Require vendors to complete information security questionnaires.
Answers
D.
Review the results of the vendor's independent control reports.
D.
Review the results of the vendor's independent control reports.
Answers
Suggested answer: D

Explanation:

Reviewing the results of the vendor's independent control reports is the best way to assess the risk associated with using a SaaS vendor because it provides an objective and reliable evaluation of the vendor's security controls and practices. Independent control reports, such as SOC 2 or ISO 27001, are conducted by third-party auditors who verify the vendor's compliance with industry standards and best practices. These reports can help the customer identify any gaps or weaknesses in the vendor's security posture and determine the level of assurance and trust they can place on the vendor.

Verifying that information security requirements are included in the contract is a good practice, but it does not provide sufficient assurance that the vendor is actually meeting those requirements. The contract may also have limitations or exclusions that reduce the customer's rights or remedies in case of a breach or incident.

Requesting customer references from the vendor is not a reliable way to assess the risk associated with using a SaaS vendor because the vendor may only provide positive or biased references that do not reflect the true experience or satisfaction of the customers. Customer references may also not have the same security needs or expectations as the customer who is conducting the assessment.

Requiring vendors to complete information security questionnaires is a useful way to gather information about the vendor's security policies and procedures, but it does not provide enough evidence or verification that the vendor is actually implementing and maintaining those policies and procedures. Information security questionnaires are also subject to the vendor's self-reporting and interpretation, which may not be accurate or consistent.Reference=

CISM Review Manual 15th Edition, page 144

SaaS Security Risk and Challenges - ISACA1

SaaS Security Checklist & Assessment Questionnaire | LeanIX2

Risk Assessment Guide for Microsoft Cloud3

Which of the following is a PRIMARY benefit of managed security solutions?

A.
Wider range of capabilities
A.
Wider range of capabilities
Answers
B.
Easier implementation across an organization
B.
Easier implementation across an organization
Answers
C.
Greater ability to focus on core business operations
C.
Greater ability to focus on core business operations
Answers
D.
Lower cost of operations
D.
Lower cost of operations
Answers
Suggested answer: C

Explanation:

Managed security solutions are services provided by external vendors that offer security expertise, resources, and tools to help organizations protect their information assets and systems. A primary benefit of managed security solutions is that they allow organizations to focus on their core business operations, while delegating the security tasks to the service provider. This can improve the efficiency and effectiveness of the organization, as well as reduce the complexity and cost of managing security internally. Managed security solutions can also provide a wider range of capabilities, easier implementation across an organization, and lower cost of operations, but these are not the primary benefits, as they may vary depending on the quality and scope of the service provider.Reference= CISM Review Manual, 16th Edition, ISACA, 2020, p.841; CISM Online Review Course, Domain 3: Information Security Program Development and Management, Module 3: Information Security Program Management, ISACA2

Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?

A.
Host patching
A.
Host patching
Answers
B.
Penetration testing
B.
Penetration testing
Answers
C.
Infrastructure hardening
C.
Infrastructure hardening
Answers
D.
Data classification
D.
Data classification
Answers
Suggested answer: D

Explanation:

Data classification is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model. Data classification is the process of categorizing data based on its sensitivity, value and criticality to the organization. Data classification helps to determine the appropriate level of protection, access control and retention for different types of data. Data classification is an essential part of data governance and risk management, as it enables the organization to comply with legal and regulatory requirements, protect its intellectual property and reputation, and optimize its data storage and usage costs.

In a SaaS model, the client organization has the least control and responsibility over the cloud infrastructure, platform and application, as these are fully managed by the cloud service provider (CSP). The client organization only has control and responsibility over its own data and users. Therefore, the client organization is responsible for defining and implementing data classification policies and procedures, and ensuring that its data is properly labeled and handled according to its classification level. The client organization is also responsible for educating its users about the importance of data classification and the best practices for data security and privacy.

The other options are not the sole responsibility of the client organization in a SaaS model, as they are either shared with or delegated to the CSP. Host patching, penetration testing and infrastructure hardening are all related to the security and maintenance of the cloud infrastructure and platform, which are the responsibility of the CSP in a SaaS model. The CSP is expected to provide regular updates, patches and fixes to the host operating system, network and application components, and to conduct periodic security assessments and audits to identify and remediate any vulnerabilities or weaknesses in the cloud environment. The client organization may have some responsibility to monitor and verify the CSP's performance and compliance with the service level agreement (SLA) and the cloud security standards and regulations, but it does not have direct control or access to the cloud infrastructure and platform.Reference=

Understanding the Shared Responsibilities Model in Cloud Services - ISACA, Figure 1

CISM Review Manual, Chapter 3, page 121

Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?

A.
IT system clocks are not synchronized with the centralized logging server.
A.
IT system clocks are not synchronized with the centralized logging server.
Answers
B.
Operating systems are no longer supported by the vendor.
B.
Operating systems are no longer supported by the vendor.
Answers
C.
The patch management system does not deploy patches in a timely manner.
C.
The patch management system does not deploy patches in a timely manner.
Answers
D.
An organization has a decentralized data center that uses cloud services.
D.
An organization has a decentralized data center that uses cloud services.
Answers
Suggested answer: A

Explanation:

A security operations center (SOC) relies on the centralized logging server to collect, store, analyze and correlate security events from various sources such as firewalls, intrusion detection systems, antivirus software, etc. The centralized logging server uses the timestamps of the events to perform the analysis and correlation. If the IT system clocks are not synchronized with the centralized logging server, the SOC will face difficulties in identifying the sequence and causality of the events, which will affect its ability to detect and respond to potential security breaches. Therefore, this presents the greatest challenge to the SOC's awareness of potential security breaches.

Operating systems that are no longer supported by the vendor may pose a security risk, but they can be mitigated by applying compensating controls such as isolation, segmentation, monitoring, etc. The patch management system that does not deploy patches in a timely manner may also increase the vulnerability exposure, but it can be remediated by prioritizing and applying the critical patches as soon as possible. An organization that has a decentralized data center that uses cloud services may face some challenges in ensuring the security and compliance of the cloud environment, but it can leverage the cloud service provider's security capabilities and tools to enhance the SOC's visibility and control.Therefore, these options are not the greatest challenges to the SOC's awareness of potential security breaches.Reference= CISM Certified Information Security Manager Study Guide, Chapter 8: Security Operations and Incident Management, page 2691; CISM Foundations: Module 4 Course, Part One: Security Operations and Incident Management2; RSI Security, Common Challenges of SOC Teams3; Infosec Matter, Security Operations Center: Challenges of SOC Teams4

Which of the following defines the triggers within a business continuity plan (BCP)? @

A.
Needs of the organization
A.
Needs of the organization
Answers
B.
Disaster recovery plan (DRP)
B.
Disaster recovery plan (DRP)
Answers
C.
Information security policy
C.
Information security policy
Answers
D.
Gap analysis
D.
Gap analysis
Answers
Suggested answer: B

Explanation:

The needs of the organization define the triggers within a business continuity plan (BCP). Triggers are the events or conditions that initiate the activation of the BCP. The triggers should be based on the organization's business objectives, risk appetite, recovery time objectives, and recovery point objectives. The triggers should also be aligned with the organization's information security policy, disaster recovery plan, and gap analysis. However, these are not the primary factors that define the triggers, but rather the supporting elements that help implement the BCP. The needs of the organization are the main drivers for determining the triggers, as they reflect the organization's priorities, expectations, and requirements for business continuity.Reference=

CISM Review Manual (Digital Version)1, Chapter 4: Information Security Incident Management, pages 191-192, 195-196, 199-200.

Business Continuity Management Guideline2, page 5, Section 4.2.1: Triggers

Business Continuity Plan - Open Risk Manual3, page 1, Section 1: Introduction

Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?

A.
Containment
A.
Containment
Answers
B.
Recovery
B.
Recovery
Answers
C.
Eradication
C.
Eradication
Answers
D.
Identification
D.
Identification
Answers
Suggested answer: A

Explanation:

According to the CISM Review Manual (Digital Version), page 212, the incident response process consists of six phases: preparation, identification, containment, eradication, recovery, and lessons learned. Containment is the phase where the incident response team isolates the affected systems or networks to prevent further damage or spread of the malware. Eradication is the phase where the incident response team removes the malware and any traces of its activity from the affected systems or networks. Recovery is the phase where the incident response team restores the normal operations of the systems or networks. Identification is the phase where the incident response team detects and analyzes the signs of the incident.Therefore, the information security manager should be confident that the malware has not continued to spread at the completion of the containment phase, which is the earliest phase where the incident response team can stop the propagation of the malware.Reference=1: CISM Review Manual (Digital Version), page 212

Total 793 questions
Go to page: of 80