ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 29

Question list
Search
Search

Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?

A.
Consult with IT staff and assess the risk based on their recommendations
A.
Consult with IT staff and assess the risk based on their recommendations
Answers
B.
Update the security policy based on the regulatory requirements
B.
Update the security policy based on the regulatory requirements
Answers
C.
Propose relevant controls to ensure the business complies with the regulation
C.
Propose relevant controls to ensure the business complies with the regulation
Answers
D.
Identify and assess the risk in the context of business objectives
D.
Identify and assess the risk in the context of business objectives
Answers
Suggested answer: D

Explanation:

Identify and assess the risk in the context of business objectives. Before making any changes to the security policy or introducing any new controls, the information security manager should first identify and assess the risk that the new privacy regulation poses to the business. This should be done in the context of the overall business objectives so that the security measures introduced are tailored to meet the specific needs of the organization.

Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?

A.
Monitor the effectiveness of controls
A.
Monitor the effectiveness of controls
Answers
B.
Update the risk assessment framework
B.
Update the risk assessment framework
Answers
C.
Review the inherent risk level
C.
Review the inherent risk level
Answers
D.
Review the risk probability and impact
D.
Review the risk probability and impact
Answers
Suggested answer: A

Explanation:

If the residual risk of the business activity is lower than the acceptable risk level, it means that the existing controls are effectively mitigating the identified risks. In this case, the best course of action is to monitor the effectiveness of the controls and ensure they remain effective. The information security manager should review and test the controls periodically to ensure that they continue to provide adequate protection. It is also essential to update the risk assessment framework to reflect changes in the business environment or risk landscape.

Which of the following is the responsibility of a risk owner?

A.
Implementing risk treatment plan activities with control owners
A.
Implementing risk treatment plan activities with control owners
Answers
B.
Evaluating control effectiveness
B.
Evaluating control effectiveness
Answers
C.
Approving risk treatment plans
C.
Approving risk treatment plans
Answers
D.
Approving the selection of risk mitigation measures
D.
Approving the selection of risk mitigation measures
Answers
Suggested answer: C

Explanation:

A risk owner is a person or entity that is responsible for ensuring that risk is managed effectively. One of the primary responsibilities of a risk owner is to implement controls that will help mitigate or manage the risk. While risk assessments, determining the organization's risk appetite, and monitoring control effectiveness are all important aspects of managing risk, it is the responsibility of the risk owner to take the necessary actions to manage the risk.

Which of the following is the MOST important requirement for a successful security program?

A.
Mapping security processes to baseline security standards
A.
Mapping security processes to baseline security standards
Answers
B.
Penetration testing on key systems
B.
Penetration testing on key systems
Answers
C.
Management decision on asset value
C.
Management decision on asset value
Answers
D.
Nondisclosure agreements (NDA) with employees
D.
Nondisclosure agreements (NDA) with employees
Answers
Suggested answer: C

Explanation:

''A successful security program requires management support and involvement. One of the key aspects of management support is to decide on the value of assets and the acceptable level of risk for them. This will help define the security objectives and priorities for the program. The other options are possible activities within a security program, but they are not as important as management decision on asset value.''

A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?

A.
Employee training on ransomware
A.
Employee training on ransomware
Answers
B.
A properly tested offline backup system
B.
A properly tested offline backup system
Answers
C.
A continual server replication process
C.
A continual server replication process
Answers
D.
A properly configured firewall
D.
A properly configured firewall
Answers
Suggested answer: B

Explanation:

The most effective way to avoid paying the ransom in a ransomware attack is to have a properly tested offline backup system. A ransomware attack is a type of cyberattack that encrypts the victim's data or systems and demands a payment for the decryption key. A properly tested offline backup system is a method of storing copies of the data or systems in a separate location that is not connected to the network or the internet. By having a properly tested offline backup system, the hospital can restore its critical server from the backup without paying the ransom or losing any data. The other options are not the most effective way to avoid paying the ransom in a ransomware attack, although they may be some preventive or detective measures. Employee training on ransomware is a preventive measure that can help raise awareness and reduce the likelihood of falling victim to phishing or other social engineering techniques that may deliver ransomware. However, it does not guarantee that employees will always follow best practices or that ransomware will not enter the network through other means. A continual server replication process is a method of creating copies of the server data or systems in real time or near real time. However, it may not be effective against ransomware, as the replication process may also copy the encrypted data or systems, making them unusable. A properly configured firewall is a preventive measure that can help block malicious network traffic and prevent unauthorized access to the server.However, it does not guarantee that ransomware will not bypass the firewall through other channels, such as email attachments or removable media.

An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?

A.
Initiate incident response.
A.
Initiate incident response.
Answers
B.
Disable remote
B.
Disable remote
Answers
C.
Initiate a device reset.
C.
Initiate a device reset.
Answers
D.
Conduct a risk assessment.
D.
Conduct a risk assessment.
Answers
Suggested answer: A

Explanation:

Initiating incident response is the first course of action for an information security manager when an employee reports the loss of a personal mobile device containing corporate information. This will help to contain the incident, assess the impact, and take appropriate measures to prevent or mitigate further damage. According to ISACA, incident management is one of the key processes for information security governance. Initiating a device reset, disabling remote access, and conducting a risk assessment are possible subsequent actions, but they should be part of the incident response plan.

Reference: 1: Find, lock, or erase a lost Android device - Google Account Help 2: Find, lock, or erase a lost Android device - Android Help 3: Lost or Stolen Mobile Device Procedure - Information Security Office : CISM Practice Quiz | CISM Exam Prep | ISACA : 200 CISM Exam Prep Questions | Free Practice Test | Simplilearn : CISM practice questions to prep for the exam | TechTarget

When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?

A.
The information security strategy
A.
The information security strategy
Answers
B.
Losses due to security incidents
B.
Losses due to security incidents
Answers
C.
The results of a risk assessment
C.
The results of a risk assessment
Answers
D.
Security investment trends in the industry
D.
Security investment trends in the industry
Answers
Suggested answer: C

Explanation:

The results of a risk assessment would best enable an informed decision by senior management when developing a business case to justify an information security investment. A risk assessment will help to identify and prioritize the threats and vulnerabilities that affect the organization's assets and processes, as well as the potential impact and likelihood of occurrence. A risk assessment will also provide a basis for selecting and evaluating the effectiveness of controls to mitigate the risks. According to CISA, developing a business case for security will be based on an in-depth understanding of organizational vulnerabilities, operational priorities, and return on investment1. The information security strategy, losses due to security incidents, and security investment trends in the industry are possible inputs or outputs of a risk assessment, but they are not sufficient to enable an informed decision by senior management.

Reference: 1: The Business Case for Security - CISA 2: The Business Case for Security | CISA 3: #HowTo: Build a Business Case for Cybersecurity Investment 4: Making the Business Case for Information Security

Which risk is introduced when using only sanitized data for the testing of applications?

A.
Data loss may occur during the testing phase.
A.
Data loss may occur during the testing phase.
Answers
B.
Data disclosure may occur during the migration event
B.
Data disclosure may occur during the migration event
Answers
C.
Unexpected outcomes may arise in production
C.
Unexpected outcomes may arise in production
Answers
D.
Breaches of compliance obligations will occur.
D.
Breaches of compliance obligations will occur.
Answers
Suggested answer: C

Explanation:

Unexpected outcomes may arise in production when using only sanitized data for the testing of applications. Sanitized data is data that has been purposely and permanently deleted or modified to prevent unauthorized access or misuse. Sanitized data may not reflect the real characteristics, patterns, or behaviors of the original data, and thus may not be suitable for testing applications that rely on data quality and accuracy. According to NIST, data sanitization methods can affect the usability of data for testing purposes1. The other options are not risks introduced by using sanitized data for testing applications, but rather risks that can be mitigated by using sanitized data. Data loss, data disclosure, and breaches of compliance obligations are possible consequences of using unsanitized data that contains sensitive or confidential information.

Reference: 2: What is Data Sanitization? | Data Erasure Methods | Imperva 3: Data sanitization techniques: Standards, practices, legislation 1: Data sanitization -- Wikipedia

Which of the following is the BEST method to ensure compliance with password standards?

A.
Implementing password-synchronization software
A.
Implementing password-synchronization software
Answers
B.
Using password-cracking software
B.
Using password-cracking software
Answers
C.
Automated enforcement of password syntax rules
C.
Automated enforcement of password syntax rules
Answers
D.
A user-awareness program
D.
A user-awareness program
Answers
Suggested answer: C

Explanation:

Automated enforcement of password syntax rules is the best method to ensure compliance with password standards. Password syntax rules define the minimum and maximum length, character types, and construction of passwords. By enforcing these rules automatically, the system can prevent users from creating or using weak or insecure passwords that do not meet the standards. According to NIST, password syntax rules should allow at least 8 characters and up to 64 characters, accept all printable ASCII characters and Unicode characters, and encourage the use of long passphrases1. The other options are not methods to ensure compliance with password standards, but rather methods to verify or improve password security. Implementing password-synchronization software can help users manage multiple passwords across different systems, but it does not ensure that the passwords comply with the standards2. Using password-cracking software can help test the strength of passwords and identify weak or compromised ones, but it does not ensure that users follow the standards3. A user-awareness program can help educate users about the importance of password security and the best practices for creating and using passwords, but it does not ensure that users comply with the standards.

Reference: 1: NIST Password Guidelines and Best Practices for 2020 - Auth0 2: Password synchronization - Wikipedia 3:

Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?

A.
Regulatory requirements
A.
Regulatory requirements
Answers
B.
Compliance acceptance
B.
Compliance acceptance
Answers
C.
Management support
C.
Management support
Answers
D.
Budgetary approval
D.
Budgetary approval
Answers
Suggested answer: C

Explanation:

Management support is the factor that has the greatest influence on the successful implementation of information security strategy goals. Management support refers to the commitment and involvement of senior executives and other key stakeholders in defining, approving, funding, and overseeing the information security strategy. Management support is essential for aligning the information security strategy with the business objectives, ensuring adequate resources and budget, fostering a security-aware culture, and enforcing accountability and compliance. According to ISACA, management support is one of the critical success factors for information security governance1. The other options are not factors that influence the successful implementation of information security strategy goals, but rather outcomes or components of the information security strategy. Regulatory requirements are external obligations that the information security strategy must comply with2. Compliance acceptance is the degree to which the organization adheres to the information security policies and standards3. Budgetary approval is the process of allocating financial resources for the information security activities and initiatives4.

Reference: 2: Information Security: Goals, Types and Applications - Exabeam 3: How to develop a cybersecurity strategy: Step-by-step guide 4: Information Security Goals And Objectives 1: The Importance of Building an Information Security Strategic Plan

Total 793 questions
Go to page: of 80