ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 27

Question list
Search
Search

Which of the following is the MOST important reason for obtaining input from risk owners when implementing controls?

A.
To reduce risk mitigation costs
A.
To reduce risk mitigation costs
Answers
B.
To resolve vulnerabilities in enterprise architecture (EA)
B.
To resolve vulnerabilities in enterprise architecture (EA)
Answers
C.
To manage the risk to an acceptable level
C.
To manage the risk to an acceptable level
Answers
D.
To eliminate threats impacting the business
D.
To eliminate threats impacting the business
Answers
Suggested answer: C

Explanation:

According to the Certified Information Security Manager (CISM) Study Manual, risk owners are responsible for managing a risk, including taking corrective action to reduce the risk to an acceptable level. When implementing controls, it is essential to obtain input from risk owners to ensure that the controls are effective in managing the risk to an acceptable level.

By obtaining input from risk owners, the organization can ensure that the controls are tailored to the specific risks and are effective in reducing the risk to an acceptable level. This can help to minimize the impact of the risk on the organization and reduce the potential for financial or reputational damage.

Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?

A.
Requiring challenge/response information
A.
Requiring challenge/response information
Answers
B.
Requiring multi factor authentication
B.
Requiring multi factor authentication
Answers
C.
Enforcing frequent password changes
C.
Enforcing frequent password changes
Answers
D.
Enforcing complex password formats
D.
Enforcing complex password formats
Answers
Suggested answer: B

Explanation:

Social engineering is a technique used by attackers to manipulate individuals into divulging sensitive information or performing actions that can compromise the security of an organization. Multi-factor authentication (MFA) is a security mechanism that requires users to provide at least two forms of authentication to verify their identity. By requiring MFA, even if an attacker successfully obtains a user's credentials through social engineering, they will not be able to access the network without the additional form of authentication.

Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?

A.
Ability to monitor and control incident management costs
A.
Ability to monitor and control incident management costs
Answers
B.
More visibility to the impact of disruptions
B.
More visibility to the impact of disruptions
Answers
C.
Effective protection of information assets
C.
Effective protection of information assets
Answers
D.
Optimized allocation of recovery resources
D.
Optimized allocation of recovery resources
Answers
Suggested answer: D

Explanation:

The explanation given in the manual is:

Incident classification criteria enable an organization to prioritize incidents based on their impact and urgency. This allows for an optimized allocation of recovery resources to minimize business disruption and ensure timely restoration of normal operations. The other choices are benefits of incident management but not directly related to incident classification criteria.

A balanced scorecard MOST effectively enables information security:

A.
risk management
A.
risk management
Answers
B.
project management
B.
project management
Answers
C.
governance
C.
governance
Answers
D.
performance
D.
performance
Answers
Suggested answer: C

Explanation:

A balanced scorecard enables information security governance by providing a framework for aligning security objectives with business goals and measuring performance against them. The other choices are not directly related to governance but may be supported by it.

A balanced scorecard is a strategic management tool that describes the cause-and-effect linkages between four high-level perspectives of strategy and execution: financial, customer, internal process, and learning and growth2.It helps organizations communicate and monitor their vision and strategy across different levels and functions2.

Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?

A.
Embedding compliance requirements within operational processes
A.
Embedding compliance requirements within operational processes
Answers
B.
Engaging external experts to provide guidance on changes in compliance requirements
B.
Engaging external experts to provide guidance on changes in compliance requirements
Answers
C.
Performing periodic audits for compliance with legal and regulatory requirements
C.
Performing periodic audits for compliance with legal and regulatory requirements
Answers
D.
Assigning the operations manager accountability for meeting compliance requirements
D.
Assigning the operations manager accountability for meeting compliance requirements
Answers
Suggested answer: A

Explanation:

Embedding compliance requirements within operational processes ensures that they are consistently followed and monitored as part of normal business activities. This provides ongoing assurance that legal and regulatory compliance requirements can be met. The other choices are not as effective as embedding compliance requirements within operational processes.

Regulatory compliance involves following external legal mandates set forth by state, federal, or international government2.Compliance requirements may vary depending on the industry, location, and nature of the organization2.Compliance helps organizations avoid legal penalties, protect their reputation, and ensure ethical conduct2.

The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?

A.
Inform senior management
A.
Inform senior management
Answers
B.
Re-evaluate the risk
B.
Re-evaluate the risk
Answers
C.
Implement compensating controls
C.
Implement compensating controls
Answers
D.
Ask the business owner for the new remediation plan
D.
Ask the business owner for the new remediation plan
Answers
Suggested answer: B

Explanation:

The first step when a new vulnerability is identified is to re-evaluate the risk associated with the vulnerability. This may require an update to the risk assessment and the implementation of additional controls. Informing senior management of the vulnerability is important, but should not be the first step. Implementing compensating controls may also be necessary, but again, should not be the first step. Asking the business owner for a remediation plan may be useful, but only after the risk has been re-evaluated.

The information security manager should first re-evaluate the risk posed by the new vulnerability to determine its impact and likelihood. Based on this assessment, appropriate actions can be taken such as informing senior management, implementing compensating controls, or requesting a remediation plan from the business owner. The other choices are possible actions but not necessarily the first one.

A vulnerability is a weakness that can be exploited by an attacker to compromise a system or network2.A vulnerability can affect key data processing systems within an organization if it exposes sensitive information, disrupts business operations, or damages assets2.A vulnerability assessment is a process of identifying and evaluating vulnerabilities and their potential consequences2

Which of the following is the MOST critical factor for information security program success?

A.
comprehensive risk assessment program for information security
A.
comprehensive risk assessment program for information security
Answers
B.
The information security manager's knowledge of the business
B.
The information security manager's knowledge of the business
Answers
C.
Security staff with appropriate training and adequate resources
C.
Security staff with appropriate training and adequate resources
Answers
D.
Ongoing audits and addressing open items
D.
Ongoing audits and addressing open items
Answers
Suggested answer: B

Explanation:

The explanation given in the manual is:

The information security manager's knowledge of the business is the most critical factor for information security program success because it enables him or her to align security objectives with business goals and communicate effectively with senior management and other stakeholders. The other choices are important elements of an information security program but not as critical as the information security manager's knowledge of the business.

An information security program is a set of policies, procedures, standards, guidelines, and tools that aim to protect an organization's information assets from threats and ensure compliance with laws and regulations. An information security manager is a professional who oversees and coordinates the implementation and maintenance of an information security program. An information security manager should have a good understanding of the business environment, culture, strategy, processes, and needs of an organization to ensure that security supports its objectives.

Which of the following is the BEST justification for making a revision to a password policy?

A.
Industry best practice
A.
Industry best practice
Answers
B.
A risk assessment
B.
A risk assessment
Answers
C.
Audit recommendation
C.
Audit recommendation
Answers
D.
Vendor recommendation
D.
Vendor recommendation
Answers
Suggested answer: B

Explanation:

A risk assessment should be conducted in order to identify the potential risks associated with a particular system or process, and to determine the best way to mitigate those risks. Making a revision to a password policy based on the results of a risk assessment is the best way to ensure that the policy is effective and secure.

According to the Certified Information Security Manager (CISM) Study manual, the BEST justification for making a revision to a password policy is a risk assessment. A risk assessment enables an organization to identify and evaluate the risks to its information assets and determine the appropriate measures to mitigate those risks, including password policies. Password policies should be based on the risks to the organization's information assets and the level of protection needed.

Which of the following has the GREATEST influence on an organization's information security strategy?

A.
The organization's risk tolerance
A.
The organization's risk tolerance
Answers
B.
The organizational structure
B.
The organizational structure
Answers
C.
Industry security standards
C.
Industry security standards
Answers
D.
Information security awareness
D.
Information security awareness
Answers
Suggested answer: A

Explanation:

An organization's information security strategy should be aligned with its risk tolerance, which is the level of risk that an organization is willing to accept in pursuit of its objectives. The strategy should aim to balance the cost of security controls with the potential impact of security incidents on the organization's objectives. Therefore, an organization's risk tolerance has the greatest influence on its information security strategy.

The organization's risk tolerance has the greatest influence on its information security strategy because it determines how much risk the organization is willing to accept and how much resources it will allocate to mitigate or transfer risk. The organizational structure, industry security standards, and information security awareness are important factors that affect the implementation and effectiveness of an information security strategy but not as much as the organization's risk tolerance.

An information security strategy is a high-level plan that defines how an organization will achieve its information security objectives and address its information security risks. An information security strategy should align with the organization's business strategy and reflect its mission, vision, values, and culture. An information security strategy should also consider the external and internal factors that influence the organization's information security environment such as laws, regulations, competitors, customers, suppliers, partners, stakeholders, employees etc.

Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?

A.
Security metrics
A.
Security metrics
Answers
B.
Security baselines
B.
Security baselines
Answers
C.
Security incident details
C.
Security incident details
Answers
D.
Security risk exposure
D.
Security risk exposure
Answers
Suggested answer: A

Explanation:

Security metrics are the most important to include in a report to key stakeholders regarding the effectiveness of an information security program because they provide objective and measurable evidence of security performance and progress. Security metrics can include measures such as the number and severity of security incidents, the level of compliance with security policies and standards, the effectiveness of security controls, and the return on investment (ROI) of security initiatives. The other choices may also be included in a security report, but security metrics are the most important.

An information security program is a set of policies, procedures, standards, guidelines, and tools that aim to protect an organization's information assets from threats and ensure compliance with laws and regulations. The effectiveness of an information security program depends on various factors, such as the organization's risk appetite, business objectives, resources, culture, and external environment. Regular reporting to key stakeholders, such as senior management, the board of directors, and business partners, is critical to maintaining their support and buy-in for the program. The report should provide clear and concise information on the program's status, achievements, challenges, and future plans, and it should be tailored to the audience's needs and expectations.

Total 793 questions
Go to page: of 80