ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 25

Question list
Search
Search

The PRIMARY objective of performing a post-incident review is to:

A.
re-evaluate the impact of incidents
A.
re-evaluate the impact of incidents
Answers
B.
identify vulnerabilities
B.
identify vulnerabilities
Answers
C.
identify control improvements.
C.
identify control improvements.
Answers
D.
identify the root cause.
D.
identify the root cause.
Answers
Suggested answer: D

Explanation:

= The PRIMARY objective of performing a post-incident review is to identify the root cause of the incident, which is the underlying factor or condition that enabled the incident to occur. Identifying the root cause helps to prevent or mitigate future incidents, as well as to improve the incident response process.Re-evaluating the impact of incidents, identifying vulnerabilities, and identifying control improvements are secondary objectives of a post-incident review, which are derived from the root cause analysis.Reference= CISM Review Manual, 16th Edition, page 3061; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 1512

The primary objective of performing a post-incident review is to identify the root cause of the incident. After an incident has occurred, the post-incident review process involves gathering and analyzing evidence to determine the cause of the incident. This analysis will help to identify both the underlying vulnerability that allowed the incident to occur, as well as any control improvements that should be implemented to prevent similar incidents from occurring in the future. Additionally, the post-incident review process can also be used to re-evaluate the impact of the incident, as well as any potential implications for the organization.

Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?

A.
Legal and regulatory requirements
A.
Legal and regulatory requirements
Answers
B.
Likelihood of a disaster
B.
Likelihood of a disaster
Answers
C.
Organizational tolerance to service interruption
C.
Organizational tolerance to service interruption
Answers
D.
Geographical location of the backup site
D.
Geographical location of the backup site
Answers
Suggested answer: C

Explanation:

= The organizational tolerance to service interruption is the most important consideration when defining a recovery strategy in a business continuity plan (BCP), as it reflects the degree of risk that the organization is willing to accept in the event of a disaster. The organizational tolerance to service interruption determines the acceptable level of downtime, data loss, or disruption that the organization can tolerate, and thus guides the selection of recovery objectives, strategies, and resources. Legal and regulatory requirements are external factors that influence the recovery strategy, but are not the primary consideration. Likelihood of a disaster is a factor that affects the recovery strategy, but is not the most important one.Geographical location of the backup site is a factor that affects the recovery strategy, but is not as critical as organizational tolerance to service interruption.Reference= CISM Review Manual, 16th Edition, page 1731; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 792

Learn more:

1. isaca.org2. amazon.com3. gov.uk

The fundamental purpose of establishing security metrics is to:

A.
increase return on investment (ROI)
A.
increase return on investment (ROI)
Answers
B.
provide feedback on control effectiveness
B.
provide feedback on control effectiveness
Answers
C.
adopt security best practices
C.
adopt security best practices
Answers
D.
establish security benchmarks
D.
establish security benchmarks
Answers
Suggested answer: B

Explanation:

The fundamental purpose of establishing security metrics is to provide feedback on the effectiveness of the information security controls and processes. Security metrics are quantitative or qualitative measures that indicate how well the organization is achieving its security objectives and goals. Security metrics can help the information security manager to monitor, evaluate, and improve the performance of the information security program, as well as to identify gaps, weaknesses, and areas for improvement. Security metrics can also help the organization to demonstrate compliance with internal and external standards, regulations, and best practices.Increasing return on investment (ROI), adopting security best practices, and establishing security benchmarks are possible outcomes or benefits of using security metrics, but they are not the fundamental purpose of establishing them.Reference= CISM Review Manual, 16th Edition, pages 46-471; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 642

Learn more:

1. isaca.org2. amazon.com3. gov.uk

Security metrics are used to measure the effectiveness of controls and evaluate the overall security posture of an organization. This feedback provides an understanding of the progress made towards achieving security objectives and allows organizations to make necessary adjustments.

While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?

A.
Assign responsibility to the database administrator (DBA).
A.
Assign responsibility to the database administrator (DBA).
Answers
B.
Review the databases for sensitive content.
B.
Review the databases for sensitive content.
Answers
C.
Prepare a report of the databases for senior management.
C.
Prepare a report of the databases for senior management.
Answers
D.
Assign the highest classification level to those databases.
D.
Assign the highest classification level to those databases.
Answers
Suggested answer: A

Explanation:

Information asset classification is the process of identifying, labeling, and categorizing information assets based on their value, sensitivity, and criticality to the organization. Information asset classification helps to establish appropriate security controls, policies, and procedures for protecting the information assets from unauthorized access, use, disclosure, modification, or destruction. One of the key elements of information asset classification is assigning owners to each information asset. Owners are responsible for managing the information asset throughout its lifecycle, including defining its security requirements, implementing security controls, monitoring its usage and performance, reporting any incidents or breaches, and ensuring compliance with legal and regulatory obligations.Therefore, assigning responsibility to the database administrator (DBA) is the best way to address the situation where several production databases do not have owners assigned to them.Reference= CISM Review Manual 15th Edition1, page 256; Information Asset and Security Classification Procedure2.

Which of the following events would MOST likely require a revision to the information security program?

A.
An increase in industry threat level .
A.
An increase in industry threat level .
Answers
B.
A significant increase in reported incidents
B.
A significant increase in reported incidents
Answers
C.
A change in IT management
C.
A change in IT management
Answers
D.
A merger with another organization
D.
A merger with another organization
Answers
Suggested answer: D

Explanation:

= A merger with another organization would MOST likely require a revision to the information security program, because it involves a significant change in the scope, structure, and objectives of the organization. A merger could affect the information security policies, procedures, roles, responsibilities, and resources of the organization, as well as introduce new risks and challenges. Therefore, the information security program should be reviewed and updated to reflect the new situation and ensure alignment with the organizational goals and strategies.An increase in industry threat level, a significant increase in reported incidents, and a change in IT management are all events that could affect the information security program without necessarily requiring a revision.Reference= CISM Review Manual, 16th Edition, page 3181; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 1532

Data entry functions for a web-based application have been outsourced to a third-party service provider who will work from a remote site Which of the following issues would be of GREATEST concern to an information security manager?

A.
The application does not use a secure communications protocol
A.
The application does not use a secure communications protocol
Answers
B.
The application is configured with restrictive access controls
B.
The application is configured with restrictive access controls
Answers
C.
The business process has only one level of error checking
C.
The business process has only one level of error checking
Answers
D.
Server-based malware protection is not enforced
D.
Server-based malware protection is not enforced
Answers
Suggested answer: D

Explanation:

Server-based malware protection is not enforced is the issue that would be of GREATEST concern to an information security manager, as it exposes the web-based application and its data to potential threats from malicious software that can compromise the confidentiality, integrity, and availability of the information. Server-based malware protection is a security control that monitors and blocks malicious activities on the server where the application runs, such as viruses, worms, trojans, ransomware, etc. Without server-based malware protection, the web-based application may be vulnerable to attacks that can damage or destroy the data stored on the server, or disrupt the normal functioning of the application. The other issues are also important, but not as critical as server-based malware protection. The application does not use a secure communications protocol may expose sensitive data in transit to eavesdropping or interception by unauthorized parties. The application is configured with restrictive access controls may limit the access rights of legitimate users to authorized resources, but it does not prevent unauthorized users from accessing them through other means.The business process has only one level of error checking may result in incorrect or inconsistent data entry or processing, but it does not guarantee data quality or accuracy.Reference= CISM Review Manual, 16th Edition, page 1751; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 812

Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?

A.
Patch management files
A.
Patch management files
Answers
B.
Network system logs
B.
Network system logs
Answers
C.
Configuration management files
C.
Configuration management files
Answers
D.
Intrusion detection system (IDS) logs
D.
Intrusion detection system (IDS) logs
Answers
Suggested answer: A

Explanation:

Patch management files are the files that contain the patches or updates for the software applications and systems that are installed on the compromised system. Patch management files are essential to recover a compromised system that needs a complete rebuild, as they can help to restore the functionality, security, and performance of the system. Without patch management files, the system may not be able to run properly or securely, and may expose the organization to further risks or vulnerabilities. Network system logs, configuration management files, and intrusion detection system (IDS) logs are also important for recovering a compromised system, but they should be considered after patch management files.Network system logs can help to identify the source and scope of the attack, configuration management files can help to restore the original settings and policies of the system, and IDS logs can help to detect any malicious activities or anomalies on the system.Reference= CISM Review Manual, 16th Edition, pages 193-1941; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 672

Which of the following is the BEST indication that an organization has a mature information security culture?

A.
Information security training is mandatory for all staff.
A.
Information security training is mandatory for all staff.
Answers
B.
The organization's information security policy is documented and communicated.
B.
The organization's information security policy is documented and communicated.
Answers
C.
The chief information security officer (CISO) regularly interacts with the board.
C.
The chief information security officer (CISO) regularly interacts with the board.
Answers
D.
Staff consistently consider risk in making decisions.
D.
Staff consistently consider risk in making decisions.
Answers
Suggested answer: D

Explanation:

The BEST indication that an organization has a mature information security culture is when its staff consistently consider risk in making decisions. When an organization's staff understands the risks associated with their actions and are empowered to make risk-informed decisions, it indicates that the organization has a mature information security culture.

According to the Certified Information Security Manager (CISM) Study Manual, 'A mature information security culture exists when the people within the organization understand and appreciate the risks associated with information and technology and when they take steps to manage those risks on a daily basis.'

While information security training, documented information security policies, and regular interaction between the chief information security officer (CISO) and the board are all important components of a mature information security culture, they are not sufficient on their own. It is only when staff consistently consider risk in making decisions that an organization's information security culture can be considered mature.

Certified Information Security Manager (CISM) Study Manual, 15th Edition, Pages 151-152.

What is the PRIMARY benefit to an organization that maintains an information security governance framework?

A.
Resources are prioritized to maximize return on investment (ROI)
A.
Resources are prioritized to maximize return on investment (ROI)
Answers
B.
Information security guidelines are communicated across the enterprise_
B.
Information security guidelines are communicated across the enterprise_
Answers
C.
The organization remains compliant with regulatory requirements.
C.
The organization remains compliant with regulatory requirements.
Answers
D.
Business risks are managed to an acceptable level.
D.
Business risks are managed to an acceptable level.
Answers
Suggested answer: D

Explanation:

According to the Certified Information Security Manager (CISM) Study Manual, a mature information security culture is one in which staff members regularly consider risk in their decisions. This means that they are aware of the risks associated with their actions and take preventative steps to reduce the likelihood of negative outcomes. Other indicators of a mature information security culture include mandatory information security training for all staff, documented and communicated information security policies, and regular interaction between the CISO and the board.

Maintaining an information security governance framework enables an organization to identify, assess, and manage its information security risks. By establishing policies, procedures, and controls that are aligned with the organization's objectives and risk tolerance, an information security governance framework helps ensure that information security risks are managed to an acceptable level.

According to the Certified Information Security Manager (CISM) Study Manual, 'Information security governance provides a framework for managing and controlling information security practices and technologies at an enterprise level. Its primary objective is to manage and reduce risk through a process of identification, assessment, and management of those risks.'

While the other options listed (prioritizing resources, communicating guidelines, and remaining compliant with regulations) are also important benefits of maintaining an information security governance framework, they are all secondary to the primary benefit of managing business risks to an acceptable level.

Certified Information Security Manager (CISM) Study Manual, 15th Edition, Pages 60-63.

Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?

A.
Performing penetration tests against the network to demonstrate business vulnerability
A.
Performing penetration tests against the network to demonstrate business vulnerability
Answers
B.
Highlighting competitor performance regarding network best security practices
B.
Highlighting competitor performance regarding network best security practices
Answers
C.
Demonstrating that targeted security controls tie to business objectives
C.
Demonstrating that targeted security controls tie to business objectives
Answers
D.
Presenting comparable security implementation estimates from several vendors
D.
Presenting comparable security implementation estimates from several vendors
Answers
Suggested answer: C

Explanation:

The most effective way to gain senior management approval of security investments in network infrastructure is by demonstrating that targeted security controls tie to business objectives.

Security investments should be tied to business objectives and should support the overall goals of the organization. By demonstrating that the security controls will directly support the organization's business objectives, senior management will be more likely to approve the investment.

According to the Certified Information Security Manager (CISM) Study Manual, 'To gain senior management's approval for investments in security, it is essential to show how the security controls tie to business objectives and are in support of the overall goals of the organization.'

While performing penetration tests against the network, highlighting competitor performance, and presenting comparable security implementation estimates from vendors are all useful in presenting the value of security investments, they are not as effective as demonstrating how the security controls will support the organization's business objectives.

Certified Information Security Manager (CISM) Study Manual, 15th Edition, Page 305.

Total 793 questions
Go to page: of 80