ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 2

Question list
Search
Search

Which of the following is the BEST evidence of alignment between corporate and information security governance?

A.
Security key performance indicators (KPIs)
A.
Security key performance indicators (KPIs)
Answers
B.
Project resource optimization
B.
Project resource optimization
Answers
C.
Regular security policy reviews
C.
Regular security policy reviews
Answers
D.
Senior management sponsorship
D.
Senior management sponsorship
Answers
Suggested answer: D

Explanation:

Alignment between corporate and information security governance means that the information security program supports the organizational goals and objectives, and is integrated into the enterprise governance structure. The best evidence of alignment is the senior management sponsorship, which demonstrates the commitment and support of the top-level executives and board members for the information security program. Senior management sponsorship also ensures that the information security program has adequate resources, authority, and accountability to achieve its objectives and address the risks and issues that affect the organization. Senior management sponsorship also helps to establish a culture of security awareness and compliance throughout the organization, and to communicate the value and benefits of the information security program to the stakeholders.

Reference=

CISM Review Manual 15th Edition, page 1631

CISM 2020: Information Security & Business Process Alignment, video 22

Certified Information Security Manager (CISM), page 33

Which of the following is a desired outcome of information security governance?

A.
Penetration test
A.
Penetration test
Answers
B.
Improved risk management
B.
Improved risk management
Answers
C.
Business agility
C.
Business agility
Answers
D.
A maturity model
D.
A maturity model
Answers
Suggested answer: C

Explanation:

Business agility is a desired outcome of information security governance, as it enables the organization to respond quickly and effectively to changing business needs and opportunities, while maintaining a high level of security and risk management. Information security governance provides the strategic direction, policies, standards, and oversight for the information security program, ensuring that it aligns with the organization's business objectives and stakeholder expectations. Information security governance also facilitates the integration of security into the business processes and systems, enhancing the organization's ability to adapt to the dynamic and complex environment. By implementing information security governance, the organization can achieve business agility, as well as other benefits such as improved risk management, compliance, reputation, and value creation.Reference= CISM Review Manual 15th Edition, page 25.

Security administration efforts will be greatly reduced following the deployment of which of the following techniques?

A.
Discretionary access control
A.
Discretionary access control
Answers
B.
Role-based access control
B.
Role-based access control
Answers
C.
Access control lists
C.
Access control lists
Answers
D.
Distributed access control
D.
Distributed access control
Answers
Suggested answer: B

Explanation:

Role-based access control (RBAC) is a policy-neutral access control mechanism that assigns access privileges to defined roles in the organization and then makes each user a member of the appropriate roles. RBAC reduces security administration efforts by simplifying the management of access rights across different users and resources. RBAC also enables consistent and efficient enforcement of the principle of least privilege, which grants users only the minimum rights required to perform their assigned tasks. RBAC can also facilitate the implementation of separation of duties, which prevents users from having conflicting or incompatible responsibilities.RBAC is among the most widely used methods in the information security tool kit1.Reference=CIS Control 6: Access Control Management - Netwrix,CISSP certification: RBAC (Role based access control),What is RBAC? (Role Based Access Control) - IONOS

What is the BEST way to reduce the impact of a successful ransomware attack?

A.
Perform frequent backups and store them offline.
A.
Perform frequent backups and store them offline.
Answers
B.
Purchase or renew cyber insurance policies.
B.
Purchase or renew cyber insurance policies.
Answers
C.
Include provisions to pay ransoms ih the information security budget.
C.
Include provisions to pay ransoms ih the information security budget.
Answers
D.
Monitor the network and provide alerts on intrusions.
D.
Monitor the network and provide alerts on intrusions.
Answers
Suggested answer: A

Explanation:

Performing frequent backups and storing them offline is the best way to reduce the impact of a successful ransomware attack, as this allows the organization to restore its data and systems without paying the ransom or losing valuable information. Purchasing or renewing cyber insurance policies may help cover some of the costs and losses associated with a ransomware attack, but it does not prevent or mitigate the attack itself. Including provisions to pay ransoms in the information security budget may encourage more attacks and does not guarantee the recovery of the data or the removal of the malware.Monitoring the network and providing alerts on intrusions may help detect and respond to a ransomware attack, but it does not reduce the impact of a successful attack that has already encrypted or exfiltrated the data.Reference= CISM Review Manual 2023, page 1661; CISM Review Questions, Answers & Explanations Manual 2023, page 312; CISM Exam Overview - Vinsys3

Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization's information security program?

A.
Focus on addressing conflicts between security and performance.
A.
Focus on addressing conflicts between security and performance.
Answers
B.
Collaborate with business and IT functions in determining controls.
B.
Collaborate with business and IT functions in determining controls.
Answers
C.
Include information security requirements in the change control process.
C.
Include information security requirements in the change control process.
Answers
D.
Obtain assistance from IT to implement automated security cantrals.
D.
Obtain assistance from IT to implement automated security cantrals.
Answers
Suggested answer: B

Explanation:

The best way for an information security manager to improve the effectiveness of an organization's information security program is to collaborate with business and IT functions in determining controls. Collaboration is a key factor for ensuring that the information security program is aligned with the organization's business objectives, risk appetite, and security strategy, and that it supports the business processes and activities. Collaboration also helps to gain the buy-in, involvement, and ownership of the business and IT functions, who are the primary stakeholders and users of the information security program. Collaboration also facilitates the communication, coordination, and integration of the information security program across the organization, and enables the information security manager to understand the needs, expectations, and challenges of the business and IT functions, and to propose the most appropriate and effective security controls and solutions.

Focusing on addressing conflicts between security and performance (A) is a possible way to improve the effectiveness of an information security program, but not the best one. Security and performance are often competing or conflicting goals, as security controls may introduce overhead, complexity, or delays that affect the efficiency, usability, or availability of the systems or processes. Addressing these conflicts may help to optimize the balance and trade-off between security and performance, and to enhance the user satisfaction and acceptance of the security controls. However, focusing on addressing conflicts between security and performance does not necessarily improve the alignment, integration, or communication of the information security program with the business and IT functions, nor does it ensure the involvement or ownership of the stakeholders.

Including information security requirements in the change control process is also a possible way to improve the effectiveness of an information security program, but not the best one. The change control process is a process that manages the initiation, approval, implementation, and review of changes to the systems or processes, such as enhancements, updates, or fixes. Including information security requirements in the change control process may help to ensure that the changes do not introduce new or increased security risks or impacts, and that they comply with the security policies, standards, and procedures. However, including information security requirements in the change control process does not necessarily improve the collaboration, communication, or coordination of the information security program with the business and IT functions, nor does it ensure the buy-in or involvement of the stakeholders.

Obtaining assistance from IT to implement automated security controls (D) is also a possible way to improve the effectiveness of an information security program, but not the best one. Automated security controls are security controls that are implemented by using software, hardware, or other technologies, such as encryption, firewalls, or antivirus, to perform security functions or tasks without human intervention. Obtaining assistance from IT to implement automated security controls may help to improve the efficiency, consistency, or reliability of the security controls, and to reduce the human errors, negligence, or malicious actions. However, obtaining assistance from IT to implement automated security controls does not necessarily improve the collaboration, communication, or integration of the information security program with the business and IT functions, nor does it ensure the ownership or involvement of the stakeholders.

Reference= CISM Review Manual, 16th Edition, Chapter 1: Information Security Governance, Section: Information Security Strategy Development, Subsection: Collaboration, page 24-251

The MAIN benefit of implementing a data loss prevention (DLP) solution is to:

A.
enhance the organization's antivirus controls.
A.
enhance the organization's antivirus controls.
Answers
B.
eliminate the risk of data loss.
B.
eliminate the risk of data loss.
Answers
C.
complement the organization's detective controls.
C.
complement the organization's detective controls.
Answers
D.
reduce the need for a security awareness program.
D.
reduce the need for a security awareness program.
Answers
Suggested answer: C

Explanation:

A data loss prevention (DLP) solution is a type of detective control that monitors and prevents unauthorized transmission or leakage of sensitive data from the organization. A DLP solution can enhance the organization's antivirus controls by detecting and blocking malicious code that attempts to exfiltrate data, but this is not its main benefit. A DLP solution cannot eliminate the risk of data loss, as there may be other sources of data loss that are not covered by the DLP solution, such as physical theft, accidental deletion, or natural disasters. A DLP solution also does not reduce the need for a security awareness program, as human factors are often the root cause of data loss incidents. A security awareness program can educate and motivate employees to follow security policies and best practices, and to report any suspicious or anomalous activities.Reference=

ISACA, CISM Review Manual, 16th Edition, 2020, page 79.

ISACA, CISM Review Questions, Answers & Explanations Database, 12th Edition, 2020, question ID 1003.

During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?

A.
Post-incident review
A.
Post-incident review
Answers
B.
Eradication
B.
Eradication
Answers
C.
Containment
C.
Containment
Answers
D.
Identification
D.
Identification
Answers
Suggested answer: B

Explanation:

The eradication phase of incident response is the stage where the incident response team documents and performs the actions required to remove the threat that caused the incident1.This phase involves identifying and eliminating the root cause of the incident, such as malware, compromised accounts, unauthorized access, or misconfigured systems2.The eradication phase also involves restoring the affected systems to a secure state, deleting any malicious files or artifacts, and verifying that the threat has been completely removed2.The eradication phase is the first step in returning a compromised environment to its proper state2. The other phases of incident response are:

Preparation: The phase where the incident response team prepares for potential incidents by defining roles, responsibilities, procedures, tools, and resources1.

Detection and analysis: The phase where the incident response team identifies and prioritizes the incidents based on their severity, impact, and urgency1.

Containment: The phase where the incident response team isolates the affected systems or networks to prevent the spread of the incident and minimize the damage1.

Recovery: The phase where the incident response team restores the normal operations of the systems or networks, and implements any necessary changes or improvements to prevent recurrence1.

Post-incident review: The phase where the incident response team evaluates the effectiveness of the incident response process, identifies the lessons learned, and provides recommendations for improvement1.Reference=3: Critical Incident Stress Management: CISM Implementation Guidelines2: What is the Eradication Phase of Incident Response?- RSI Security1: Incident Response Models - ISACA

Which of the following is PRIMARILY determined by asset classification?

A.
Insurance coverage required for assets
A.
Insurance coverage required for assets
Answers
B.
Level of protection required for assets
B.
Level of protection required for assets
Answers
C.
Priority for asset replacement
C.
Priority for asset replacement
Answers
D.
Replacement cost of assets
D.
Replacement cost of assets
Answers
Suggested answer: B

Explanation:

Asset classification is the process of assigning a value to information assets based on their importance to the organization and the potential impact of their compromise, loss or damage1.Asset classification helps to determine the level of protection required for assets, which is proportional to their value and sensitivity2.Asset classification also facilitates risk assessment and management, as well as compliance with legal, regulatory and contractual requirements3.Asset classification does not primarily determine the insurance coverage, priority for replacement, or replacement cost of assets, as these factors depend on other criteria such as risk appetite, business impact, availability and market value4.Reference=1: CISM - Information Asset Classification Flashcards | Quizlet2: CISM Exam Content Outline | CISM Certification | ISACA3: CIS Control 1: Inventory and Control of Enterprise Assets4: CISSP versus the CISM Certification | ISC2

ACISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider's data center. Which of the following should the CISO do FIRST?

A.
Recommend canceling the outsourcing contract.
A.
Recommend canceling the outsourcing contract.
Answers
B.
Request an independent review of the provider's data center.
B.
Request an independent review of the provider's data center.
Answers
C.
Notify affected customers of the data breach.
C.
Notify affected customers of the data breach.
Answers
D.
Determine the extent of the impact to the organization.
D.
Determine the extent of the impact to the organization.
Answers
Suggested answer: D

Explanation:

The CISO should first determine the extent of the impact to the organization by assessing the nature and scope of the data breach, the type and sensitivity of the data involved, the potential harm to the organization and its customers, and the legal and contractual obligations of the organization and the service provider. This will help the CISO to prioritize the appropriate actions and resources to respond to the incident and mitigate the risks.The other options are possible actions that the CISO may take after determining the impact, depending on the circumstances and the outcomes of the investigation.Reference= CISM Review Manual 15th Edition, page 2231; CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, Question ID: 1030

An information security manager developing an incident response plan MUST ensure it includes:

A.
an inventory of critical data.
A.
an inventory of critical data.
Answers
B.
criteria for escalation.
B.
criteria for escalation.
Answers
C.
a business impact analysis (BIA).
C.
a business impact analysis (BIA).
Answers
D.
critical infrastructure diagrams.
D.
critical infrastructure diagrams.
Answers
Suggested answer: B

Explanation:

An incident response plan is a set of procedures and guidelines that define the roles and responsibilities of the incident response team, the steps to follow in the event of an incident, and the communication and escalation protocols to ensure timely and effective resolution of incidents. One of the essential components of an incident response plan is the criteria for escalation, which specify the conditions and thresholds that trigger the escalation of an incident to a higher level of authority or a different function within the organization. The criteria for escalation may depend on factors such as the severity, impact, duration, scope, and complexity of the incident, as well as the availability and capability of the incident response team.The criteria for escalation help to ensure that incidents are handled by the appropriate personnel, that management is kept informed and involved, and that the necessary resources and support are provided to resolve the incident.Reference= https://blog.exigence.io/a-practical-approach-to-incident-management-escalation https://www.uc.edu/content/dam/uc/infosec/docs/Guidelines/Information_Security_Incident_Response_Escalation_Guideline.pdf

Total 793 questions
Go to page: of 80