ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 28

Question list
Search
Search

Reverse lookups can be used to prevent successful:

A.
denial of service (DoS) attacks
A.
denial of service (DoS) attacks
Answers
B.
session hacking
B.
session hacking
Answers
C.
phishing attacks
C.
phishing attacks
Answers
D.
Internet protocol (IP) spoofing
D.
Internet protocol (IP) spoofing
Answers
Suggested answer: D

Explanation:

Reverse lookups can be used to prevent successful IP spoofing. IP spoofing is a type of attack in which an attacker sends packets with a false source IP address in order to disguise their identity or impersonate another system. By performing reverse lookups on the source IP address of incoming packets, the system can verify that the packets are coming from a trusted source, and any packets with an invalid or spoofed source IP can be discarded. This is an important measure for preventing IP spoofing, and can help to reduce the risk of other types of attacks, such as DoS attacks, session hacking, and phishing attacks.

Which of the following is the MOST effective way to prevent information security incidents?

A.
Implementing a security information and event management (SIEM) tool
A.
Implementing a security information and event management (SIEM) tool
Answers
B.
Implementing a security awareness training program for employees
B.
Implementing a security awareness training program for employees
Answers
C.
Deploying a consistent incident response approach
C.
Deploying a consistent incident response approach
Answers
D.
Deploying intrusion detection tools in the network environment
D.
Deploying intrusion detection tools in the network environment
Answers
Suggested answer: B

Explanation:

The most effective way to prevent information security incidents is to implement a security awareness training program for employees. Security awareness training provides employees with the knowledge and skills they need to identify potential security threats and protect their systems from unauthorized access and malicious activity. Security awareness training also helps to ensure that employees understand their roles and responsibilities when it comes to information security, and can help to reduce the risk of information security incidents by making employees more aware of potential risks. Additionally, implementing a security information and event management (SIEM) tool, deploying a consistent incident response approach, and deploying intrusion detection tools in the network environment can also help to reduce the risk of security incidents

Which of the following BEST demonstrates the added value of an information security program?

A.
Security baselines
A.
Security baselines
Answers
B.
A gap analysis
B.
A gap analysis
Answers
C.
A SWOT analysis
C.
A SWOT analysis
Answers
D.
A balanced scorecard
D.
A balanced scorecard
Answers
Suggested answer: D

Explanation:

A balanced scorecard is a tool that can be used to demonstrate the added value of an information security program by measuring and reporting on key performance indicators (KPIs) and key risk indicators (KRIs) aligned with strategic objectives. Security baselines, a gap analysis and a SWOT analysis are all useful for assessing and improving security posture, but they do not necessarily show how security contributes to business value.

Which of the following should be the FIRST step in developing an information security strategy?

A.
Determine acceptable levels of information security risk
A.
Determine acceptable levels of information security risk
Answers
B.
Create a roadmap to identify security baselines and controls
B.
Create a roadmap to identify security baselines and controls
Answers
C.
Perform a gap analysis based on the current state
C.
Perform a gap analysis based on the current state
Answers
D.
Identify key stakeholders to champion information security
D.
Identify key stakeholders to champion information security
Answers
Suggested answer: D

Explanation:

The first step in developing an information security strategy is to identify key stakeholders who can provide support, guidance and resources for information security initiatives. These stakeholders may include senior management, business unit leaders, legal counsel, audit and compliance officers and other relevant parties. By engaging these stakeholders early on, an information security manager can ensure that the strategy aligns with business objectives and expectations, as well as gain buy-in and commitment from them. Determining acceptable levels of risk, creating a roadmap and performing a gap analysis are all important steps in developing an information security strategy, but they should follow after identifying key stakeholders.

Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?

A.
Risk acceptance by the business has been documented
A.
Risk acceptance by the business has been documented
Answers
B.
Teams and individuals responsible for recovery have been identified
B.
Teams and individuals responsible for recovery have been identified
Answers
C.
Copies of recovery and incident response plans are kept offsite
C.
Copies of recovery and incident response plans are kept offsite
Answers
D.
Incident response and recovery plans are documented in simple language
D.
Incident response and recovery plans are documented in simple language
Answers
Suggested answer: B

Explanation:

Before conducting full-functional continuity testing, an information security manager should verify that teams and individuals responsible for recovery have been identified and trained on their roles and responsibilities. This will ensure that the testing can be executed effectively and efficiently, as well as identify any gaps or issues in the recovery process. Risk acceptance by the business, copies of plans kept offsite and plans documented in simple language are all good practices for continuity management, but they are not as important as having clear roles and responsibilities defined before testing.

An anomaly-based intrusion detection system (IDS) operates by gathering data on:

A.
normal network behavior and using it as a baseline lor measuring abnormal activity
A.
normal network behavior and using it as a baseline lor measuring abnormal activity
Answers
B.
abnormal network behavior and issuing instructions to the firewall to drop rogue connections
B.
abnormal network behavior and issuing instructions to the firewall to drop rogue connections
Answers
C.
abnormal network behavior and using it as a baseline for measuring normal activity
C.
abnormal network behavior and using it as a baseline for measuring normal activity
Answers
D.
attack pattern signatures from historical data
D.
attack pattern signatures from historical data
Answers
Suggested answer: A

Explanation:

An anomaly-based intrusion detection system (IDS) operates by gathering data on normal network behavior and using it as a baseline for measuring abnormal activity. This is important because it allows the IDS to detect any activity that is outside of the normal range of usage for the network, which can help to identify potential malicious activity or security threats. Additionally, the IDS will monitor for any changes in the baseline behavior and alert the administrator if any irregularities are detected. By contrast, signature-based IDSs operate by gathering attack pattern signatures from historical data and comparing them against incoming traffic in order to identify malicious activity.

A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?

A.
Ensure a risk assessment is performed to evaluate the findings
A.
Ensure a risk assessment is performed to evaluate the findings
Answers
B.
Ensure vulnerabilities found are resolved within acceptable timeframes
B.
Ensure vulnerabilities found are resolved within acceptable timeframes
Answers
C.
Request funding needed to resolve the top vulnerabilities
C.
Request funding needed to resolve the top vulnerabilities
Answers
D.
Report findings to senior management
D.
Report findings to senior management
Answers
Suggested answer: D

Which of the following is the BEST course of action when an online company discovers a network attack in progress?

A.
Dump all event logs to removable media
A.
Dump all event logs to removable media
Answers
B.
Isolate the affected network segment
B.
Isolate the affected network segment
Answers
C.
Enable trace logging on ail events
C.
Enable trace logging on ail events
Answers
D.
Shut off all network access points
D.
Shut off all network access points
Answers
Suggested answer: B

Explanation:

The BEST course of action when an online company discovers a network attack in progress is to isolate the affected network segment. This prevents the attacker from gaining further access to the network and limits the scope of the attack. Dumping event logs to removable media and enabling trace logging may be useful for forensic purposes, but should not be the first course of action in the midst of an active attack. Shutting off all network access points would be too drastic and would prevent legitimate traffic from accessing the network.

Relationships between critical systems are BEST understood by

A.
evaluating key performance indicators (KPIs)
A.
evaluating key performance indicators (KPIs)
Answers
B.
performing a business impact analysis (BIA)
B.
performing a business impact analysis (BIA)
Answers
C.
developing a system classification scheme
C.
developing a system classification scheme
Answers
D.
evaluating the recovery time objectives (RTOs)
D.
evaluating the recovery time objectives (RTOs)
Answers
Suggested answer: B

Explanation:

The explanation given is: ''A BIA is a process that identifies and evaluates the potential effects of natural and man-made events on business operations. It helps to understand how critical systems are interrelated and what their dependencies are. A BIA also helps to determine the RTOs for each system. The other options are not directly related to understanding the relationships between critical systems.''

To help ensure that an information security training program is MOST effective its contents should be

A.
focused on information security policy.
A.
focused on information security policy.
Answers
B.
aligned to business processes
B.
aligned to business processes
Answers
C.
based on employees' roles
C.
based on employees' roles
Answers
D.
based on recent incidents
D.
based on recent incidents
Answers
Suggested answer: C

Explanation:

''An information security training program should be tailored to the specific roles and responsibilities of employees. This will help them understand how their actions affect information security and what they need to do to protect it. A generic training program that is focused on policy, business processes or recent incidents may not be relevant or effective for all employees.''

Total 793 questions
Go to page: of 80