ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 24

Question list
Search
Search

List of questions

Search

Which of the following BEST determines the allocation of resources during a security incident response?

A.
Senior management commitment
A.
Senior management commitment
Answers
B.
A business continuity plan (BCP)
B.
A business continuity plan (BCP)
Answers
C.
An established escalation process
C.
An established escalation process
Answers
D.
Defined levels of severity
D.
Defined levels of severity
Answers
Suggested answer: D

Explanation:

= The allocation of resources during a security incident response depends on the defined levels of severity, which indicate the potential impact and urgency of the incident. The levels of severity help prioritize the response activities and assign the appropriate roles and responsibilities.Senior management commitment, a business continuity plan (BCP), and an established escalation process are important factors for an effective incident response, but they do not directly determine the allocation of resources.Reference= CISM Review Manual, 16th Edition, page 3011; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 1462

Learn more:

1. isaca.org2. amazon.com3. gov.uk

Defined levels of severity is the best determinant of the allocation of resources during a security incident response. Having defined levels of severity allows organizations to plan for and allocate resources for each level of incident, depending on the severity of the incident. This ensures that the right resources are allocated in a timely manner and that incidents are addressed appropriately.

During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:

A.
baseline security controls.
A.
baseline security controls.
Answers
B.
benchmarking security metrics.
B.
benchmarking security metrics.
Answers
C.
security objectives.
C.
security objectives.
Answers
D.
cost-benefit analyses.
D.
cost-benefit analyses.
Answers
Suggested answer: C

Explanation:

During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address security objectives, which are derived from the business objectives and the risk assessment. Security objectives define the desired level of protection for the system and its data, and guide the selection of security controls in later phases. Baseline security controls are predefined sets of security requirements that apply to common types of systems or environments. Benchmarking security metrics is a process of comparing the performance of security processes or controls against a standard or best practice.Cost-benefit analyses are used to evaluate the feasibility and effectiveness of security controls, and are usually performed in the acquisition/development phase or the implementation phase of the SDLC.Reference= CISM Review Manual, 16th Edition, page 1021; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 772

Learn more:

1. isaca.org2. amazon.com3. gov.uk

Which of the following would BEST justify continued investment in an information security program?

A.
Reduction in residual risk
A.
Reduction in residual risk
Answers
B.
Security framework alignment
B.
Security framework alignment
Answers
C.
Speed of implementation
C.
Speed of implementation
Answers
D.
Industry peer benchmarking
D.
Industry peer benchmarking
Answers
Suggested answer: A

Explanation:

Residual risk is the risk that remains after implementing controls to mitigate the inherent risk. A reduction in residual risk indicates that the information security program is effective in managing the risks to an acceptable level. This would best justify the continued investment in the program, as it demonstrates the value and benefits of the security activities. Security framework alignment, speed of implementation, and industry peer benchmarking are not direct measures of the effectiveness or value of the information security program.They may be useful for comparison or compliance purposes, but they do not necessarily reflect the impact of the program on the risk profile of the organization.Reference= CISM Review Manual, 16th Edition, page 431; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 622 Residual risk is the remaining risk after all security controls have been implemented. It is important to measure the residual risk of an organization in order to determine the effectiveness of the security program and to justify continued investment in the program. A reduction in residual risk is an indication that the security program is effective and that continued investment is warranted.

An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?

A.
Include security requirements in the contract
A.
Include security requirements in the contract
Answers
B.
Assess security controls.
B.
Assess security controls.
Answers
C.
Perform a risk assessment
C.
Perform a risk assessment
Answers
D.
Review data architecture.
D.
Review data architecture.
Answers
Suggested answer: C

Explanation:

Performing a risk assessment is the best approach to determine how to protect newly acquired data assets prior to integration, as it will help to identify the threats, vulnerabilities, impacts, and likelihoods of the data assets, and to prioritize the appropriate risk treatment options. Including security requirements in the contract is a good practice, but it may not be sufficient to address the specific risks of the data assets.Assessing security controls and reviewing data architecture are also important steps, but they should be done after performing a risk assessment, as they will depend on the risk level and the risk app

The best approach to determine how to protect newly acquired data assets prior to integration is to perform a risk assessment. A risk assessment will identify the various threats and vulnerabilities associated with the data assets and help the organization develop an appropriate security strategy. This risk assessment should include an assessment of the security controls in place to protect the data, a review of the data architecture, and a review of any contractual requirements related to security.

Which of the following sources is MOST useful when planning a business-aligned information security program?

A.
Security risk register
A.
Security risk register
Answers
B.
Information security policy
B.
Information security policy
Answers
C.
Business impact analysis (BIA)
C.
Business impact analysis (BIA)
Answers
D.
Enterprise architecture (EA)
D.
Enterprise architecture (EA)
Answers
Suggested answer: C

Explanation:

A business-aligned information security program is one that supports the organization's business objectives and aligns the information security strategy with the business functions. A business impact analysis (BIA) is a process that identifies the critical business processes, assets, and functions of an organization, and assesses their potential impact in the event of a disruption or loss. A BIA helps to prioritize the information security requirements and controls that are needed to protect the organization's critical assets and functions from various threats and risks. Therefore, a BIA is one of the most useful sources when planning a business-aligned information security program.Reference= CISM Review Manual 15th Edition, page 254; CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, QID 229. The most useful source when planning a business-aligned information security program is a Business Impact Analysis (BIA). A BIA is a process of identifying and evaluating the potential effects of disruptions to an organization's operations, and helps to identify the security controls and measures that should be implemented to reduce the impact of those disruptions. The BIA should include an assessment of the organization's information security posture, including its security policies, risk register, and enterprise architecture. With this information, organizations can develop an information security program that is aligned to the organization's business objectives.

When collecting admissible evidence, which of the following is the MOST important requirement?

A.
Need to know
A.
Need to know
Answers
B.
Preserving audit logs
B.
Preserving audit logs
Answers
C.
Due diligence
C.
Due diligence
Answers
D.
Chain of custody
D.
Chain of custody
Answers
Suggested answer: D

Explanation:

Chain of custody is the MOST important requirement when collecting admissible evidence, because it ensures the integrity and authenticity of the evidence by documenting its history, handling, and storage. Chain of custody records who, what, when, where, why, and how the evidence was collected, analyzed, and preserved. Without a proper chain of custody, the evidence may be challenged or rejected in a court of law.Need to know, preserving audit logs, and due diligence are important aspects of evidence collection, but they are not as critical as chain of custody.Reference= CISM Review Manual, 16th Edition, page 3031; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 1492 The most important requirement when collecting admissible evidence is the chain of custody. The chain of custody is a documented record of who had control of the evidence at any given time, from the point of collection until the evidence is presented in court. This is important in order to ensure the evidence can be authenticated and is not subject to tampering or any other form of interference. Other important considerations include need to know, preserving audit logs, and due diligence.

Which of the following should be the PRIMARY basis for an information security strategy?

A.
The organization's vision and mission
A.
The organization's vision and mission
Answers
B.
Results of a comprehensive gap analysis
B.
Results of a comprehensive gap analysis
Answers
C.
Information security policies
C.
Information security policies
Answers
D.
Audit and regulatory requirements
D.
Audit and regulatory requirements
Answers
Suggested answer: A

Explanation:

The organization's vision and mission should be the PRIMARY basis for an information security strategy, as they define the purpose and direction of the organization and its information security needs. A comprehensive gap analysis is a tool to identify the current state and desired state of information security, and the actions needed to close the gap. Information security policies are the high-level statements of management's intent and expectations for information security, and are derived from the information security strategy.Audit and regulatory requirements are external factors that influence the information security strategy, but are not the primary basis for it.Reference= CISM Review Manual, 16th Edition, pages 17-181; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 782

The primary basis for an information security strategy should be the organization's vision and mission. The organization's vision and mission should be the foundation for the security strategy, and should inform and guide the security policies, procedures, and practices that are implemented. The results of a comprehensive gap analysis, information security policies, and audit and regulatory requirements should all be taken into consideration when developing the security strategy, but should not be the primary basis.

An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?

A.
Conduct an information security audit.
A.
Conduct an information security audit.
Answers
B.
Validate the relevance of the information.
B.
Validate the relevance of the information.
Answers
C.
Perform a gap analysis.
C.
Perform a gap analysis.
Answers
D.
Inform senior management
D.
Inform senior management
Answers
Suggested answer: B

Explanation:

The information security manager's first course of action should be to validate the relevance of the information received from the threat intelligence service. This means verifying the source, credibility, accuracy, and timeliness of the information, as well as assessing the potential impact and likelihood of the threat for the organization. This will help the information security manager to determine the appropriate response and prioritize the actions to mitigate the threat. Conducting an information security audit, performing a gap analysis, and informing senior management are possible subsequent actions, but they are not the first course of action. An information security audit is a systematic and independent assessment of the effectiveness of the information security controls and processes. A gap analysis is a comparison of the current state of the information security program with the desired state or best practices.Informing senior management is a communication activity that should be done after validating the information and assessing the risk.Reference= CISM Review Manual, 16th Edition, pages 44-451; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 632

The first step the information security manager should take upon learning of the potential threat is to validate the relevance of the information. This should involve researching the threat to evaluate its potential impact on the organization and to determine the accuracy of the threat intelligence. Once the information is validated, the information security manager can then take action, such as informing senior management, conducting an information security audit, or performing a gap analysis.

The PRIMARY advantage of single sign-on (SSO) is that it will:

A.
increase efficiency of access management
A.
increase efficiency of access management
Answers
B.
increase the security of related applications.
B.
increase the security of related applications.
Answers
C.
strengthen user passwords.
C.
strengthen user passwords.
Answers
D.
support multiple authentication mechanisms.
D.
support multiple authentication mechanisms.
Answers
Suggested answer: A

Explanation:

Single sign-on (SSO) is a technology that allows users to access multiple applications or services with one set of credentials, such as a username and password. The primary advantage of SSO is that it increases the efficiency of access management, as it reduces the need for users to remember and enter multiple passwords for different applications or services. SSO also simplifies the user experience, as they can log in once and access multiple resources without having to switch between different windows or tabs. SSO can also improve the security of related applications, as it reduces the risk of password compromise or phishing attacks. However, SSO does not strengthen user passwords or support multiple authentication mechanisms by itself.It is a complementary technology that enhances the security and convenience of access management.Reference= CISM Review Manual, 16th Edition, page 991

The primary advantage of single sign-on (SSO) is that it increases the efficiency of access management. With SSO, users only need to remember one set of credentials to access all of their applications, rather than having to remember multiple usernames and passwords for each application. This simplifies the user experience and helps to reduce the amount of time spent managing access to multiple applications. Additionally, SSO can also increase the security of related applications, as users are not sharing the same credentials across multiple applications, and it can also support multiple authentication mechanisms, such as biometric authentication.

A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:

A.
developing a security program that meets global and regional requirements.
A.
developing a security program that meets global and regional requirements.
Answers
B.
ensuring effective communication with local regulatory bodies.
B.
ensuring effective communication with local regulatory bodies.
Answers
C.
using industry best practice to meet local legal regulatory requirements.
C.
using industry best practice to meet local legal regulatory requirements.
Answers
D.
monitoring compliance with defined security policies and standards.
D.
monitoring compliance with defined security policies and standards.
Answers
Suggested answer: A

Explanation:

= A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. This means that the CISO has to deal with multiple and diverse legal, regulatory, and compliance issues across different jurisdictions and markets. The CISO should be most concerned with developing a security program that meets global and regional requirements, such as ISO/IEC 27001, NIST CSF, PCI DSS, GDPR, etc. These standards provide a framework for establishing, implementing, maintaining, and improving an information security management system (ISMS) that aligns with the organization's business objectives and risk appetite. The CISO should also ensure that the security program is consistent and coherent across all operating locations, and that it complies with the specific regulations of each location. Therefore, option A is the most appropriate answer.Reference= CISM Review Manual 15th Edition, page 255; CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, QID 234. In this scenario, the chief information security officer (CISO) should be most concerned with developing a security program that meets the global and regional requirements of the organization. This includes considering the different legal and regulatory requirements of each operating location, and designing a security program that meets all of these requirements. The CISO should also ensure effective communication with local regulatory bodies to ensure compliance and understanding of the security program. Additionally, the CISO should use industry best practices and defined security policies and standards to ensure the program meets all applicable requirements.

Total 793 questions
Go to page: of 80