ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 22

Question list
Search
Search

Which of the following roles is BEST able to influence the security culture within an organization?

A.
Chief information security officer (CISO)
A.
Chief information security officer (CISO)
Answers
B.
Chief information officer (CIO)
B.
Chief information officer (CIO)
Answers
C.
Chief executive officer (CEO)
C.
Chief executive officer (CEO)
Answers
D.
Chief operating officer (COO)
D.
Chief operating officer (COO)
Answers
Suggested answer: C

Explanation:

The CEO is the best able to influence the security culture within an organization because the CEO sets the tone and direction for the organization and has the authority and responsibility to ensure that the organization's objectives are aligned with its strategy. The CEO can also communicate the importance and value of information security to all stakeholders and foster a culture of security awareness and accountability.The CISO, CIO and COO are important roles in information security management, but they do not have the same level of influence and authority as the CEO.Reference= CISM Review Manual, 16th Edition, page 221; CISM Exam Content Outline, Domain 1, Task 12

The Chief Information Security Officer (CISO) is responsible for leading and coordinating an organization's information security program, and as such, is in a prime position to influence the security culture within the organization. The CISO is responsible for setting policies and standards, educating employees about security risks and best practices, and ensuring that the organization is taking appropriate measures to mitigate security risks. By demonstrating a strong commitment to information security, the CISO can help to create a security-aware culture within the organization.

Which of the following backup methods requires the MOST time to restore data for an application?

A.
Full backup
A.
Full backup
Answers
B.
Incremental
B.
Incremental
Answers
C.
Differential
C.
Differential
Answers
D.
Disk mirroring
D.
Disk mirroring
Answers
Suggested answer: A

Explanation:

= An incremental backup method only backs up the data that has changed since the last backup, whether it was a full or an incremental backup. This method requires the least amount of time and storage space for backup, but it requires the most time to restore data for an application. To restore data from an incremental backup, the latest full backup and all the subsequent incremental backups are needed. A full backup method backs up all the data in a system or an application at a point in time. This method requires the most amount of time and storage space for backup, but it requires the least time to restore data for an application. To restore data from a full backup, only the latest full backup is needed. A differential backup method backs up the data that has changed since the last full backup. This method requires more time and storage space for backup than the incremental method, but less than the full backup method. It also requires less time to restore data for an application than the incremental method, but more than the full backup method. To restore data from a differential backup, the latest full backup and the latest differential backup are needed. A disk mirroring method creates an exact copy of a disk on another disk in real time. This method provides the highest level of availability and fault tolerance, but it also requires twice the amount of disk space. To restore data from a disk mirroring method, the mirrored disk can be used as the primary disk in case of a failure.Reference= CISM Review Manual 15th Edition, page 201-202.

The method that requires the MOST time to restore data for an application is a Full Backup. Full backups contain all the data that is required to restore an application, but the process of restoring the data is the most time-consuming as it involves copying all the data from the backup to the application. Incremental backups only backup the changes made since the last backup, differential backups only backup changes made since the last full backup, and disk mirroring provides real-time data replication, so the data is immediately available.

The PRIMARY purpose for continuous monitoring of security controls is to ensure:

A.
control gaps are minimized.
A.
control gaps are minimized.
Answers
B.
system availability.
B.
system availability.
Answers
C.
effectiveness of controls.
C.
effectiveness of controls.
Answers
D.
alignment with compliance requirements.
D.
alignment with compliance requirements.
Answers
Suggested answer: C

Explanation:

The primary purpose for continuous monitoring of security controls is to ensure the effectiveness of controls. This involves regularly assessing the controls to ensure that they are meeting their intended objectives, and that any potential weaknesses are identified and addressed. Continuous monitoring also helps to ensure that control gaps are minimized, and that systems are available and aligned with compliance requirements.

The primary purpose of continuous monitoring of security controls is to ensure that the controls are operating effectively and providing adequate protection for the information assets.Continuous monitoring can also help to identify control gaps, ensure system availability, and support compliance requirements, but these are secondary benefits12Reference=1: SP 800-137, Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations, page 1-12: A Practical Approach to Continuous Control Monitoring, ISACA Journal, Volume 2, 2015, page 1.

Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?

A.
Maintaining a repository base of security policies
A.
Maintaining a repository base of security policies
Answers
B.
Measuring impact of exploits on business processes
B.
Measuring impact of exploits on business processes
Answers
C.
Facilitating the monitoring of risk occurrences
C.
Facilitating the monitoring of risk occurrences
Answers
D.
Redirecting event logs to an alternate location for business continuity plan
D.
Redirecting event logs to an alternate location for business continuity plan
Answers
Suggested answer: C

Explanation:

A security information and event management (SIEM) system is a tool that collects, analyzes, and correlates security events from various sources, such as firewalls, intrusion detection systems, antivirus software, and other devices. A SIEM system can provide real-time alerts, dashboards, reports, and forensic analysis of security incidents. The greatest value of a SIEM system is that it can facilitate the monitoring of risk occurrences by identifying anomalies, trends, patterns, and indicators of compromise that may otherwise go unnoticed. A SIEM system can also help with incident response, compliance, and audit activities by providing evidence and documentation of security events.

Reference=

ISACA, CISM Review Manual, 16th Edition, 2020, page 2291

ISACA, CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, 2020, question ID 2082

The greatest value provided by a Security Information and Event Management (SIEM) system is facilitating the monitoring of risk occurrences. SIEM systems collect, analyze and alert on security-related data from various sources such as firewall logs, intrusion detection/prevention systems, and system logs. This allows organizations to identify security threats in real-time and respond quickly, helping to mitigate potential harm to their systems and data.

An organization's quality process can BEST support security management by providing:

A.
security configuration controls.
A.
security configuration controls.
Answers
B.
assurance that security requirements are met.
B.
assurance that security requirements are met.
Answers
C.
guidance for security strategy.
C.
guidance for security strategy.
Answers
D.
a repository for security systems documentation.
D.
a repository for security systems documentation.
Answers
Suggested answer: B

Explanation:

= A quality process is a set of activities that ensures that the products or services delivered by an organization meet the customer's expectations and comply with the applicable standards and regulations. A quality process can support security management by providing assurance that security requirements are met throughout the development, implementation and maintenance of information systems and processes.A quality process can also help to identify and correct security defects, measure security performance and effectiveness, and improve security practices and procedures.References= CISM Review Manual, 15th Edition, page 671; CISM Review Questions, Answers & Explanations Database, question ID 2092.

An organization's quality process can BEST support security management by providing assurance that security requirements are met. This means that the quality process can be used to ensure that security controls are being implemented as intended and that they are achieving the desired results. This helps to ensure that the organization is properly protected and that it is in compliance with security regulations and standards.

When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?

A.
External consultant
A.
External consultant
Answers
B.
Information owners
B.
Information owners
Answers
C.
Information security manager
C.
Information security manager
Answers
D.
Business continuity coordinator
D.
Business continuity coordinator
Answers
Suggested answer: B

Explanation:

Information owners are responsible for determining the initial recovery time objective (RTO) for their information assets and processes, as they are the ones who understand the business requirements and impact of a disruption. An external consultant may assist in conducting the business impact analysis (BIA), but does not have the authority to decide the RTO. An information security manager may provide input on the security aspects of the RTO, but does not have the business perspective to determine the RTO. A business continuity coordinator may facilitate the BIA process and ensure the alignment of the RTO with the business continuity plan, but does not have the ownership of the information assets and processes.Reference= CISM Review Manual 15th Edition, page 202.

When performing a business impact analysis (BIA), it is the responsibility of the business continuity coordinator to determine the initial recovery time objective (RTO). The RTO is a critical component of the BIA and should be determined in cooperation with the information owners. The RTO should reflect the maximum tolerable period of disruption (MTPD) and should be used to guide the development of the recovery strategy.

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

A.
Wipe and reset the endpoint device.
A.
Wipe and reset the endpoint device.
Answers
B.
Isolate the endpoint device.
B.
Isolate the endpoint device.
Answers
C.
Power off the endpoint device.
C.
Power off the endpoint device.
Answers
D.
Run a virus scan on the endpoint device.
D.
Run a virus scan on the endpoint device.
Answers
Suggested answer: B

Explanation:

Isolating the endpoint device is the best course of action to prevent further damage, as it will prevent the potential spread of malware or compromise to other devices or systems on the network. Wiping and resetting the endpoint device may be a possible recovery option, but it is not the first priority and it may also destroy valuable forensic evidence. Powering off the endpoint device may also cause loss of data or evidence, and it may not stop the attack if the device is remotely controlled. Running a virus scan on the endpoint device may not be effective if the device is already compromised, and it may also trigger malicious actions by the attacker.Reference= CISM Review Manual 15th Edition, page 203.Boosting Cyberresilience for Critical Enterprise IT Systems With COBIT and NIST Cybersecurity Frameworks1, Endpoint Security: On the Frontline of Cyber Risk2.

The best course of action to prevent further damage is to isolate the endpoint device. Isolating the endpoint device will prevent the compromised system from connecting to other systems on the network and spreading the infection. Other possible courses of action include wiping and resetting the endpoint device, running a virus scan, and powering off the endpoint device. However, these actions will not prevent the compromised system from continuing to spread the infection.

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

A.
Wipe and reset the endpoint device.
A.
Wipe and reset the endpoint device.
Answers
B.
Isolate the endpoint device.
B.
Isolate the endpoint device.
Answers
C.
Power off the endpoint device.
C.
Power off the endpoint device.
Answers
D.
Run a virus scan on the endpoint device.
D.
Run a virus scan on the endpoint device.
Answers
Suggested answer: B

Explanation:

A compromised endpoint device is a potential threat to the security of the network and the data stored on it. The best course of action to prevent further damage is to isolate the endpoint device from the network and other devices, so that the attacker cannot access or spread to other systems. Isolating the endpoint device also allows the information security manager to investigate the incident and determine the root cause, the extent of the compromise, and the appropriate remediation steps. Wiping and resetting the endpoint device may not be feasible or desirable, as it may result in data loss or evidence destruction. Powering off the endpoint device may not stop the attack, as the attacker may have installed persistent malware or backdoors that can resume once the device is powered on again.Running a virus scan on the endpoint device may not be effective, as the attacker may have used sophisticated techniques to evade detection or disable the antivirus software.Reference= CISM Review Manual, 15th Edition, page 1741; CISM Review Questions, Answers & Explanations Database, question ID 2112; Using EDR to Address Unmanaged Devices - ISACA3; Boosting Cyberresilience for Critical Enterprise IT Systems With COBIT and NIST Cybersecurity Frameworks - ISACA; Endpoint Security: On the Frontline of Cyber Risk.

The best way to reduce the risk associated with a bring your own device (BYOD) program is to implement a mobile device policy and standard. This policy should include guidelines and rules regarding the use of mobile devices, such as acceptable use guidelines and restrictions on the types of data that can be stored or accessed on the device. Additionally, it should also include requirements for secure mobile device practices, such as the use of strong passwords, encryption, and regular patching. A mobile device management (MDM) solution can also be implemented to help ensure mobile devices meet the organizational security requirements. However, it is not enough to simply implement the policy and MDM solution; employees must also be trained on the secure mobile device practices to ensure the policy is followed.

An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?

A.
Install the OS, patches, and application from the original source.
A.
Install the OS, patches, and application from the original source.
Answers
B.
Restore the OS, patches, and application from a backup.
B.
Restore the OS, patches, and application from a backup.
Answers
C.
Restore the application and data from a forensic copy.
C.
Restore the application and data from a forensic copy.
Answers
D.
Remove all signs of the intrusion from the OS and application.
D.
Remove all signs of the intrusion from the OS and application.
Answers
Suggested answer: A

Explanation:

After an intrusion has been detected and contained, the system should be recovered to a known and trusted state. The best practice for ensuring the integrity of the recovered system is to install the OS, patches, and application from the original source, such as the vendor's website or media. This way, any malicious code or backdoors that may have been inserted by the intruder can be eliminated. Restoring the OS, patches, and application from a backup may not guarantee the integrity of the system, as the backup may have been compromised or outdated. Restoring the application and data from a forensic copy may preserve the evidence of the intrusion, but it may also reintroduce the vulnerability or malware that allowed the intrusion in the first place. Removing all signs of the intrusion from the OS and application may not be sufficient or feasible, as the intruder may have made subtle or hidden changes that are difficult to detect or undo.

Reference=

ISACA, CISM Review Manual, 16th Edition, 2020, page 2401

ISACA, CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, 2020, question ID 2132

The BEST practice for ensuring the integrity of the recovered system after an intrusion is to restore the OS, patches, and application from a backup. This will ensure that the system is in a known good state, without any potential residual malicious code or changes from the intrusion. Restoring from a backup also enables the organization to revert to a previous configuration that has been tested and known to be secure. This step should be taken prior to conducting a thorough investigation and forensic analysis to determine the cause and extent of the intrusion.

The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:

A.
validate the confidentiality during analysis.
A.
validate the confidentiality during analysis.
Answers
B.
reinstate original data when accidental changes occur.
B.
reinstate original data when accidental changes occur.
Answers
C.
validate the integrity during analysis.
C.
validate the integrity during analysis.
Answers
D.
provide backup in case of media failure.
D.
provide backup in case of media failure.
Answers
Suggested answer: C

Explanation:

The disk hash value is a unique identifier that is calculated from the binary data of the disk. It is used to verify that the disk image is an exact copy of the original disk and that no changes have occurred during the acquisition or analysis process. The disk hash value is stored externally, such as on a CD-ROM or a USB drive, to prevent tampering or corruption.The disk hash value can also be used as evidence in court to prove the authenticity and reliability of the digital evidence123Reference=1: CISM Review Manual 15th Edition, ISACA, 2017, page 2532: Guide to Computer Forensics and Investigations Fourth Edition, page 4-103: Forensic disk acquisition over the network, Andrea Fortuna, 2018. The main purpose of creating and storing an external disk hash value when performing forensic data acquisition from a hard disk is to validate the integrity of the data during the analysis. This is done by comparing the original hash value of the disk to the hash value created during the acquisition process, which can be used to ensure that the data has not been tampered with or corrupted in any way. Additionally, by creating a hash value of the disk, it can be used to quickly verify the integrity of any data that is accessed from the disk in the future.

Total 793 questions
Go to page: of 80