ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 3

Question list
Search
Search

Which of the following BEST supports the incident management process for attacks on an organization's supply chain?

A.
Including service level agreements (SLAs) in vendor contracts
A.
Including service level agreements (SLAs) in vendor contracts
Answers
B.
Establishing communication paths with vendors
B.
Establishing communication paths with vendors
Answers
C.
Requiring security awareness training for vendor staff
C.
Requiring security awareness training for vendor staff
Answers
D.
Performing integration testing with vendor systems
D.
Performing integration testing with vendor systems
Answers
Suggested answer: A

Explanation:

The best way to support the incident management process for attacks on an organization's supply chain is to establish communication paths with vendors. This means that the organization and its vendors have clear and agreed-upon channels, methods, and protocols for exchanging information and coordinating actions in the event of an incident that affects the supply chain. Communication paths with vendors can help to identify the source, scope, and impact of the incident, as well as to share best practices, lessons learned, and recovery strategies. Communication paths with vendors can also facilitate the escalation and resolution of the incident, as well as the reporting and documentation of the incident.Communication paths with vendors are part of the incident response plan (IRP), which is a component of the information security program (ISP)12345.

The other options are not the best ways to support the incident management process for attacks on the organization's supply chain. Including service level agreements (SLAs) in vendor contracts can help to define the expectations and obligations of the parties involved in the supply chain, as well as the penalties for non-compliance. However, SLAs do not necessarily address the specific procedures and requirements for incident management, nor do they ensure effective communication and collaboration among the parties. Requiring security awareness training for vendor staff can help to reduce the likelihood and severity of incidents by enhancing the knowledge and skills of the vendor personnel who handle the organization's data and systems. However, security awareness training does not guarantee that the vendor staff will follow the appropriate incident management processes, nor does it address the communication and coordination issues that may arise during an incident. Performing integration testing with vendor systems can help to ensure the compatibility and functionality of the systems that are part of the supply chain, as well as to identify and mitigate any vulnerabilities or errors that could lead to incidents.However, integration testing does not cover all the possible scenarios and risks that could affect the supply chain, nor does it provide the necessary communication and response mechanisms for incident management.Reference=1,2,3,4,5

https://niccs.cisa.gov/education-training/catalog/skillsoft/cism-information-security-incident-management-part-1 https://niccs.cisa.gov/education-training/catalog/skillsoft/cism-information-security-incident-management-part-1

Which of the following BEST ensures information security governance is aligned with corporate governance?

A.
A security steering committee including IT representation
A.
A security steering committee including IT representation
Answers
B.
A consistent risk management approach
B.
A consistent risk management approach
Answers
C.
An information security risk register
C.
An information security risk register
Answers
D.
Integration of security reporting into corporate reporting
D.
Integration of security reporting into corporate reporting
Answers
Suggested answer: D

Explanation:

The best way to ensure information security governance is aligned with corporate governance is to integrate security reporting into corporate reporting. This will enable the board and senior management to oversee and monitor the performance and effectiveness of the information security program, as well as the alignment of information security objectives and strategies with business goals and risk appetite. Security reporting should provide relevant, timely, accurate, and actionable information to support decision making and accountability.The other options are important components of information security governance, but they do not ensure alignment with corporate governance by themselves.Reference= CISM Review Manual 15th Edition, page 411; CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, Question ID: 1027

Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?

A.
Perform a risk assessment.
A.
Perform a risk assessment.
Answers
B.
Reduce security hardening settings.
B.
Reduce security hardening settings.
Answers
C.
Inform business management of the risk.
C.
Inform business management of the risk.
Answers
D.
Document a security exception.
D.
Document a security exception.
Answers
Suggested answer: A

Explanation:

Security hardening is the process of applying security configuration settings to systems and software to reduce their attack surface and improve their resistance to threats1.Security hardening settings are based on industry standards and best practices, such as the CIS Benchmarks2, which provide recommended security configurations for various software applications, operating systems, and network devices.However, security hardening settings may not always be compatible with the business requirements and objectives of an organization, and may negatively impact the functionality, performance, or usability of the systems and software3. Therefore, before applying any security hardening settings, an information security manager should perform a risk assessment to evaluate the potential benefits and drawbacks of the settings, and to identify and prioritize the risks associated with them. A risk assessment is a systematic process of identifying, analyzing, and evaluating the risks that an organization faces, and determining the appropriate risk responses. A risk assessment helps the information security manager to balance the security and business needs of the organization, and to communicate the risk level and impact to the relevant stakeholders.A risk assessment should be performed first, before taking any other actions, such as reducing security hardening settings, informing business management of the risk, or documenting a security exception, because it provides the necessary information and justification for making informed and rational decisions.References=1: Basics of the CIS Hardening Guidelines | RSI Security2: CIS Baseline Hardening and Security Configuration Guide | CalCom3: CISM Review Manual 15th Edition, page 121 : CISM Review Manual 15th Edition, page 122 : CISM Review Manual 15th Edition, page 145 : CISM Review Manual 15th Edition, page 146 : CISM Review Manual 15th Edition, page 147

Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?

A.
To identify the organization's risk tolerance
A.
To identify the organization's risk tolerance
Answers
B.
To improve security processes
B.
To improve security processes
Answers
C.
To align security roles and responsibilities
C.
To align security roles and responsibilities
Answers
D.
To optimize security risk management
D.
To optimize security risk management
Answers
Suggested answer: D

Explanation:

= The most important reason to ensure information security is aligned with the organization's strategy is to optimize security risk management. Information security is not an isolated function, but rather an integral part of the organization's overall objectives, processes, and governance.By aligning information security with the organization's strategy, the information security manager can ensure that security risks are identified, assessed, treated, and monitored in a consistent, effective, and efficient manner1.Alignment also enables the information security manager to communicate the value and benefits of information security to senior management and other stakeholders, and to justify the allocation of resources and investments for security initiatives2.Alignment also helps to establish clear roles and responsibilities for information security across the organization, and to foster a culture of security awareness and accountability3.Therefore, alignment is essential for optimizing security risk management, which is the process of balancing the protection of information assets with the business objectives and risk appetite of the organization4.Reference=1: CISM Exam Content Outline | CISM Certification | ISACA2: CISM_Review_Manual Pages 1-30 - Flip PDF Download | FlipHTML53: CISM 2020: Information Security & Business Process Alignment4: CISM Review Manual 15th Edition, Chapter 2, Section 2.1

Which of the following should be the MOST important consideration when establishing information security policies for an organization?

A.
Job descriptions include requirements to read security policies.
A.
Job descriptions include requirements to read security policies.
Answers
B.
The policies are updated annually.
B.
The policies are updated annually.
Answers
C.
Senior management supports the policies.
C.
Senior management supports the policies.
Answers
D.
The policies are aligned to industry best practices.
D.
The policies are aligned to industry best practices.
Answers
Suggested answer: C

Explanation:

The most important consideration when establishing information security policies for an organization is to ensure that senior management supports the policies. Senior management support is essential for the successful implementation and enforcement of information security policies, as it demonstrates the commitment and accountability of the organization's leadership to information security. Senior management support also helps to allocate adequate resources, establish clear roles and responsibilities, and promote a security-aware culture within the organization. Without senior management support, information security policies may not be aligned with the organization's goals and objectives, may not be communicated and disseminated effectively, and may not be followed or enforced consistently.

Job descriptions that include requirements to read security policies are a way of ensuring that employees are aware of their security obligations, but they are not the most important consideration when establishing information security policies. The policies should be relevant and applicable to the employees' roles and functions, and should be reinforced by regular training and awareness programs.

The policies should be updated periodically to reflect the changes in the organization's environment, risks, and requirements, but updating them annually may not be sufficient or necessary. The frequency of updating the policies should depend on the nature and impact of the changes, and should be determined by a defined policy review process.

The policies should be aligned with industry best practices, standards, and frameworks, but this is not the most important consideration when establishing information security policies. The policies should also be customized and tailored to the organization's specific context, needs, and expectations, and should be consistent with the organization's vision, mission, and values.Reference=

ISACA, CISM Review Manual, 16th Edition, 2020, pages 37-38.

ISACA, CISM Review Questions, Answers & Explanations Database, 12th Edition, 2020, question ID 1009.

Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?

A.
Threat management is enhanced.
A.
Threat management is enhanced.
Answers
B.
Compliance status is improved.
B.
Compliance status is improved.
Answers
C.
Security metrics are enhanced.
C.
Security metrics are enhanced.
Answers
D.
Proactive risk management is facilitated.
D.
Proactive risk management is facilitated.
Answers
Suggested answer: D

Explanation:

A vulnerability assessment process is a systematic and proactive approach to identify, analyze and prioritize the vulnerabilities in an information system. It helps to reduce the exposure of the system to potential threats and improve the security posture of the organization. By implementing a vulnerability assessment process, the organization can facilitate proactive risk management, which is the PRIMARY benefit of this process. Proactive risk management is the process of identifying, assessing and mitigating risks before they become incidents or cause significant impact to the organization. Proactive risk management enables the organization to align its security strategy with its business objectives, optimize its security resources and investments, and enhance its resilience and compliance.

A . Threat management is enhanced. This is a secondary benefit of implementing a vulnerability assessment process. Threat management is the process of identifying, analyzing and responding to the threats that may exploit the vulnerabilities in an information system. Threat management is enhanced by implementing a vulnerability assessment process, as it helps to reduce the attack surface and prioritize the most critical threats. However, threat management is not the PRIMARY benefit of implementing a vulnerability assessment process, as it is a reactive rather than proactive approach to risk management.

B . Compliance status is improved. This is a secondary benefit of implementing a vulnerability assessment process. Compliance status is the degree to which an organization adheres to the applicable laws, regulations, standards and policies that govern its information security. Compliance status is improved by implementing a vulnerability assessment process, as it helps to demonstrate the organization's commitment to security best practices and meet the expectations of the stakeholders and regulators. However, compliance status is not the PRIMARY benefit of implementing a vulnerability assessment process, as it is a result rather than a driver of risk management.

C . Security metrics are enhanced. This is a secondary benefit of implementing a vulnerability assessment process. Security metrics are the quantitative and qualitative measures that indicate the effectiveness and efficiency of the information security processes and controls. Security metrics are enhanced by implementing a vulnerability assessment process, as it helps to provide objective and reliable data for security monitoring and reporting. However, security metrics are not the PRIMARY benefit of implementing a vulnerability assessment process, as they are a means rather than an end of risk management.

Reference=

CISM Review Manual 15th Edition, pages 1-301

CISM Exam Content Outline2

Risk Assessment for Technical Vulnerabilities3

A Step-By-Step Guide to Vulnerability Assessment4

Which of the following metrics BEST measures the effectiveness of an organization's information security program?

A.
Increase in risk assessments completed
A.
Increase in risk assessments completed
Answers
B.
Reduction in information security incidents
B.
Reduction in information security incidents
Answers
C.
Return on information security investment
C.
Return on information security investment
Answers
D.
Number of information security business cases developed
D.
Number of information security business cases developed
Answers
Suggested answer: C

Explanation:


When properly implemented, secure transmission protocols protect transactions:

A.
from eavesdropping.
A.
from eavesdropping.
Answers
B.
from denial of service (DoS) attacks.
B.
from denial of service (DoS) attacks.
Answers
C.
on the client desktop.
C.
on the client desktop.
Answers
D.
in the server's database.
D.
in the server's database.
Answers
Suggested answer: A

Explanation:

Secure transmission protocols are network protocols that ensure the integrity and security of data transmitted across network connections. The specific network security protocol used depends on the type of protected data and network connection.Each protocol defines the techniques and procedures required to protect the network data from unauthorized or malicious attempts to read or exfiltrate information1. One of the most common threats to network data is eavesdropping, which is the interception and analysis of network traffic by an unauthorized third party.Eavesdropping can compromise the confidentiality, integrity, and availability of network data, and can lead to data breaches, identity theft, fraud, espionage, and sabotage2. Therefore, secure transmission protocols protect transactions from eavesdropping by using encryption, authentication, and integrity mechanisms to prevent unauthorized access and modification of network data. Encryption is the process of transforming data into an unreadable format using a secret key, so that only authorized parties can decrypt and access the data. Authentication is the process of verifying the identity and legitimacy of the parties involved in a network communication, using methods such as passwords, certificates, tokens, or biometrics.Integrity is the process of ensuring that the data has not been altered or corrupted during transmission, using methods such as checksums, hashes, or digital signatures3. Some examples of secure transmission protocols are:

Secure Sockets Layer (SSL) and Transport Layer Security (TLS), which are widely used protocols for securing web, email, and other application layer communications over the Internet. SSL and TLS use symmetric encryption, asymmetric encryption, and digital certificates to establish secure sessions between clients and servers, and to encrypt and authenticate the data exchanged.

Internet Protocol Security (IPsec), which is a protocol and algorithm suite that secures data transferred over public networks like the Internet. IPsec operates at the network layer and provides end-to-end security for IP packets. IPsec uses two main protocols: Authentication Header (AH), which provides data integrity and authentication, and Encapsulating Security Payload (ESP), which provides data confidentiality, integrity, and authentication. IPsec also uses two modes: transport mode, which protects the payload of IP packets, and tunnel mode, which protects the entire IP packet.

Secure Shell (SSH), which is a protocol that allows secure remote login and command execution over insecure networks. SSH uses encryption, authentication, and integrity to protect the data transmitted between a client and a server. SSH also supports port forwarding, which allows secure tunneling of other network services through SSH connections.

Reference=1: 6 Network Security Protocols You Should Know | Cato Networks2: Eavesdropping Attacks - an overview | ScienceDirect Topics3: Network Security Protocols - an overview | ScienceDirect Topics : SSL/TLS (Secure Sockets Layer/Transport Layer Security) - Definition : IPsec - Wikipedia : Secure Shell - Wikipedia

Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?

A.
Metrics to drive the information security program
A.
Metrics to drive the information security program
Answers
B.
Information security policies
B.
Information security policies
Answers
C.
A defined security organizational structure
C.
A defined security organizational structure
Answers
D.
An information security strategy
D.
An information security strategy
Answers
Suggested answer: D

Explanation:

An information security strategy is the most important element to have in place as a basis for developing an effective information security program that supports the organization's business goals.An information security strategy is a high-level plan that defines the vision, mission, objectives, scope, and principles of information security for the organization1.It also aligns the information security program with the organization's strategy, culture, risk appetite, and governance framework2.An information security strategy provides the direction, guidance, and justification for the information security program, and ensures that the program is consistent, coherent, and comprehensive3.An information security strategy also helps to prioritize the information security initiatives, allocate the resources, and measure the performance and value of the information security program4.

The other options are not as important as an information security strategy, because they are either derived from or dependent on the strategy. Metrics are used to drive the information security program, but they need to be based on the strategy and aligned with the goals and objectives of the program. Information security policies are the rules and standards that implement the information security strategy and define the expected behavior and responsibilities of the stakeholders.A defined security organizational structure is the way the information security roles and functions are organized and coordinated within the organization, and it should reflect the strategy and the governance model.Reference=1: CISM Review Manual 15th Edition, Chapter 1, Section 1.12: CISM Review Manual 15th Edition, Chapter 1, Section 1.23: CISM Review Manual 15th Edition, Chapter 1, Section 1.34: CISM Review Manual 15th Edition, Chapter 1, Section 1.4 : CISM Review Manual 15th Edition, Chapter 1, Section 1.5 : CISM Review Manual 15th Edition, Chapter 1, Section 1.6 : CISM Review Manual 15th Edition, Chapter 1, Section 1.7

Which of the following is the MOST important consideration when establishing an organization's information security governance committee?

A.
Members have knowledge of information security controls.
A.
Members have knowledge of information security controls.
Answers
B.
Members are business risk owners.
B.
Members are business risk owners.
Answers
C.
Members are rotated periodically.
C.
Members are rotated periodically.
Answers
D.
Members represent functions across the organization.
D.
Members represent functions across the organization.
Answers
Suggested answer: D

Explanation:

= The most important consideration when establishing an organization's information security governance committee is to ensure that members represent functions across the organization. This is because the information security governance committee is responsible for setting the direction, scope, and objectives of the information security program, and for ensuring that the program aligns with the organization's business goals and strategies. By having members from different functions, such as finance, human resources, operations, legal, and IT, the committee can ensure that the information security program considers the needs, expectations, and perspectives of various stakeholders, and that the program supports the organization's mission, vision, and values. Having a diverse and representative committee also helps to foster a culture of security awareness and accountability throughout the organization, and to promote collaboration and communication among different functions.

Members having knowledge of information security controls, members being business risk owners, and members being rotated periodically are all desirable characteristics of an information security governance committee, but they are not the most important consideration. Members having knowledge of information security controls can help the committee to understand the technical aspects of information security and to evaluate the effectiveness and efficiency of the information security program. However, having technical knowledge is not sufficient to ensure that the information security program is aligned with the organization's business goals and strategies, and that the program considers the needs and expectations of various stakeholders. Members being business risk owners can help the committee to identify and prioritize the information security risks that affect the organization's business objectives, and to allocate appropriate resources and responsibilities for managing those risks. However, being a business risk owner does not necessarily imply that the member has a comprehensive and balanced view of the organization's information security needs and expectations, and that the member can represent the interests and perspectives of various functions. Members being rotated periodically can help the committee to maintain its independence and objectivity, and to avoid conflicts of interest or complacency. However, rotating members too frequently can also reduce the continuity and consistency of the information security program, and can affect the committee's ability to monitor and evaluate the performance and progress of the information security program.Reference=

ISACA, CISM Review Manual, 16th Edition, 2020, pages 36-37.

ISACA, CISM Review Questions, Answers & Explanations Database, 12th Edition, 2020, question ID 1014.

Total 793 questions
Go to page: of 80