ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 26

Question list
Search
Search

Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?

A.
Integrity
A.
Integrity
Answers
B.
Authenticity
B.
Authenticity
Answers
C.
Confidentiality
C.
Confidentiality
Answers
D.
Nonrepudiation
D.
Nonrepudiation
Answers
Suggested answer: C

Explanation:

Confidentiality is the security objective that best ensures that information is protected against unauthorized disclosure. Confidentiality means that only authorized parties can access or view sensitive or classified information. Integrity means that information is accurate and consistent and has not been tampered with or modified by unauthorized parties. Authenticity means that information is genuine and trustworthy and has not been forged or misrepresented by unauthorized parties. Nonrepudiation means that information can be verified and proven to be sent or received by a specific party without any possibility of denial.

Reference: https://www.csoonline.com/article/3513899/the-cia-triad-definition-components-and-examples.html

Which of the following provides the BEST evidence that a recently established infofmation security program is effective?

A.
The number of reported incidents has increased
A.
The number of reported incidents has increased
Answers
B.
Regular IT balanced scorecards are communicated.
B.
Regular IT balanced scorecards are communicated.
Answers
C.
Senior management has reported fewer junk emails.
C.
Senior management has reported fewer junk emails.
Answers
D.
The number of tickets associated with IT incidents have stayed consistent
D.
The number of tickets associated with IT incidents have stayed consistent
Answers
Suggested answer: A

Explanation:

The number of reported incidents has increased is the best evidence that a recently established information security program is effective because it indicates that the organization has improved its detection and reporting capabilities and has raised awareness among employees about security issues. Regular IT balanced scorecards are communicated is not a good evidence because it does not measure the actual performance or outcomes of the security program. Senior management has reported fewer junk emails is not a good evidence because it does not reflect the overall security posture or maturity of the organization. The number of tickets associated with IT incidents have stayed consistent is not a good evidence because it does not show any improvement or reduction in security incidents or risks.

Reference: https://www.isaca.org/resources/isaca-journal/issues/2016/volume-6/how-to-measure-the-effectiveness-of-information-security-using-iso-27004 https://www.isaca.org/resources/isaca-journal/issues/2014/volume-6/how-to-measure-the-effectiveness-of-your-information-security-management-system

Recovery time objectives (RTOs) are an output of which of the following?

A.
Business continuity plan (BCP)
A.
Business continuity plan (BCP)
Answers
B.
Disaster recovery plan (DRP)
B.
Disaster recovery plan (DRP)
Answers
C.
Service level agreement (SLA)
C.
Service level agreement (SLA)
Answers
D.
Business impact analysis (BIA)
D.
Business impact analysis (BIA)
Answers
Suggested answer: D

Explanation:

Business impact analysis (BIA) is the process that provides the output of recovery time objectives (RTOs), which are the maximum acceptable time frames for restoring business functions or processes after a disruption. Business continuity plan (BCP) is the document that describes the strategies and procedures for ensuring the continuity of critical business functions or processes in the event of a disruption. Disaster recovery plan (DRP) is the document that describes the technical steps and resources for restoring IT systems and data in the event of a disruption. Service level agreement (SLA) is the document that defines the expectations and obligations between a service provider and a service consumer, such as availability, performance, and security.

Reference: https://www.isaca.org/resources/isaca-journal/issues/2018/volume-1/business-impact-analysis-bia-and-disaster-recovery-planning-drp https://www.isaca.org/resources/isaca-journal/issues/2017/volume-6/service-level-agreements-in-the-cloud

Which of the following would MOST effectively ensure that a new server is appropriately secured?

A.
Performing secure code reviews
A.
Performing secure code reviews
Answers
B.
Enforcing technical security standards
B.
Enforcing technical security standards
Answers
C.
Conducting penetration testing
C.
Conducting penetration testing
Answers
D.
Initiating security scanning
D.
Initiating security scanning
Answers
Suggested answer: B

Explanation:

Enforcing technical security standards is the most effective way to ensure that a new server is appropriately secured because it ensures that the server complies with the organization's security policies and best practices, such as encryption, authentication, patching, and hardening. Performing secure code reviews is not relevant for securing a new server, unless it is running custom applications that need to be verified for security flaws. Conducting penetration testing is not sufficient for securing a new server, because it only identifies vulnerabilities that can be exploited by attackers, but does not fix them. Initiating security scanning is not sufficient for securing a new server, because it only detects known vulnerabilities or misconfigurations, but does not enforce security standards or remediate issues.

Reference: https://www.isaca.org/resources/isaca-journal/issues/2016/volume-4/technical-security-standards-for-information-systems https://www.isaca.org/resources/isaca-journal/issues/2017/volume-3/secure-code-review https://www.isaca.org/resources/isaca-journal/issues/2017/volume-2/the-value-of-penetration-testing https://www.isaca.org/resources/isaca-journal/issues/2016/volume-5/security-scanning-versus-penetration-testing

Which of the following should be the PRIMARY objective of an information security governance framework?

A.
Provide a baseline for optimizing the security profile of the organization.
A.
Provide a baseline for optimizing the security profile of the organization.
Answers
B.
Demonstrate senior management commitment.
B.
Demonstrate senior management commitment.
Answers
C.
Demonstrate compliance with industry best practices to external stakeholders.
C.
Demonstrate compliance with industry best practices to external stakeholders.
Answers
D.
Ensure that users comply with the organization's information security policies.
D.
Ensure that users comply with the organization's information security policies.
Answers
Suggested answer: A

Explanation:

According to the Certified Information Security Manager (CISM) Study Manual, 'The primary objective of information security governance is to provide a framework for managing and controlling information security practices and technologies at an enterprise level. Its goal is to manage and reduce risk through a process of identification, assessment, and management of those risks.'

While demonstrating senior management commitment, compliance with industry best practices, and ensuring user compliance with policies are all important aspects of information security governance, they are not the primary objective. The primary objective is to manage and reduce risk by establishing a framework for managing and controlling information security practices and technologies at an enterprise level.

Certified Information Security Manager (CISM) Study Manual, 15th Edition, Page 60.

Which of the following is the PRIMARY objective of a business impact analysis (BIA)?

A.
Determine recovery priorities.
A.
Determine recovery priorities.
Answers
B.
Define the recovery point objective (RPO).
B.
Define the recovery point objective (RPO).
Answers
C.
Confirm control effectiveness.
C.
Confirm control effectiveness.
Answers
D.
Analyze vulnerabilities.
D.
Analyze vulnerabilities.
Answers
Suggested answer: A

Explanation:

The primary objective of a business impact analysis (BIA) is to determine recovery priorities. The BIA is used to identify and analyze the potential effects of an incident on the organization, including the financial impact, operational impact, and reputational impact. The BIA also helps to identify critical resources and processes, determine recovery objectives and strategies, and develop recovery plans.

Reference: Certified Information Security Manager (CISM) Study Manual, Chapter 4, Business Impact Analysis.

Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?

A.
Providing training from third-party forensics firms
A.
Providing training from third-party forensics firms
Answers
B.
Obtaining industry certifications for the response team
B.
Obtaining industry certifications for the response team
Answers
C.
Conducting tabletop exercises appropriate for the organization
C.
Conducting tabletop exercises appropriate for the organization
Answers
D.
Documenting multiple scenarios for the organization and response steps
D.
Documenting multiple scenarios for the organization and response steps
Answers
Suggested answer: C

Explanation:

The BEST way for an organization to ensure that incident response teams are properly prepared is by conducting tabletop exercises appropriate for the organization.

Tabletop exercises are an effective way to test and validate an organization's incident response plan (IRP) and the readiness of the incident response team. These exercises simulate different scenarios in a controlled environment and allow the team to practice their response procedures, identify gaps, and make improvements to the plan. By conducting regular tabletop exercises, the incident response team can stay current with changes in the threat landscape and ensure that they are prepared to respond to incidents effectively.

According to the Certified Information Security Manager (CISM) Study Manual, 'Tabletop exercises are a valuable tool for testing and validating the effectiveness of the IRP and the readiness of the incident response team. These exercises simulate different scenarios in a controlled environment and allow the team to practice their response procedures, identify gaps, and make improvements to the plan.'

While providing training from third-party forensics firms, obtaining industry certifications, and documenting multiple scenarios for the organization and response steps can all be useful in preparing incident response teams, they are not as effective as conducting tabletop exercises appropriate for the organization.

Certified Information Security Manager (CISM) Study Manual, 15th Edition, Page 324.

Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?

A.
Revisit the business objective.
A.
Revisit the business objective.
Answers
B.
Escalate to senior management.
B.
Escalate to senior management.
Answers
C.
Perform a cost-benefit analysis.
C.
Perform a cost-benefit analysis.
Answers
D.
Recommend risk acceptance.
D.
Recommend risk acceptance.
Answers
Suggested answer: B

Explanation:

Escalate to senior management, because this could help the information security manager to inform the decision-makers of the situation, explain the implications and trade-offs, and seek their guidance and approval for the next steps2. However, this answer is not certain, and you might need to consider other factors as well.

Which of the following is the MOST important detail to capture in an organization's risk register?

A.
Risk appetite
A.
Risk appetite
Answers
B.
Risk severity level
B.
Risk severity level
Answers
C.
Risk acceptance criteria
C.
Risk acceptance criteria
Answers
D.
Risk ownership
D.
Risk ownership
Answers
Suggested answer: D

Explanation:

Risk ownership is the most important detail to capture in an organization's risk register. Risk ownership is the responsibility for managing a risk, including taking corrective action, and should be assigned to a specific individual or team. It is important to note that the risk owner is not necessarily the same as the risk acceptor, who is the individual or team who makes the final decision to accept a risk. Capturing risk ownership in the risk register is important to ensure that risks are actively managed and that the responsible parties are held accountable.

Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?

A.
It transfers the risk associated with recovery to a third party.
A.
It transfers the risk associated with recovery to a third party.
Answers
B.
It lowers the annual cost to the business.
B.
It lowers the annual cost to the business.
Answers
C.
It eliminates the need to maintain offsite facilities.
C.
It eliminates the need to maintain offsite facilities.
Answers
D.
It eliminates the need for the business to perform testing.
D.
It eliminates the need for the business to perform testing.
Answers
Suggested answer: B
Total 793 questions
Go to page: of 80