ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 33

Question list
Search
Search

The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:

A.
cause fewer potential production issues.
A.
cause fewer potential production issues.
Answers
B.
require less IT staff preparation.
B.
require less IT staff preparation.
Answers
C.
simulate real-world attacks.
C.
simulate real-world attacks.
Answers
D.
identify more threats.
D.
identify more threats.
Answers
Suggested answer: C

Explanation:

The primary advantage of performing black-box control tests as opposed to white-box control tests is that they simulate real-world attacks. Black-box control tests are a software testing methodology in which the tester analyzes the functionality of an application without a thorough knowledge of its internal design. Conversely, in white-box control tests, the tester is knowledgeable of the internal design of the application and analyzes it during testing. By performing black-box control tests, the tester can mimic the perspective and behavior of an external attacker who does not have access to the source code or the implementation details of the application. This way, the tester can evaluate how the application responds to different inputs and scenarios, and identify any vulnerabilities or errors that may affect its functionality or security. The other options are not the primary advantage of performing black-box control tests, although they may be some benefits or drawbacks depending on the context. Causing fewer potential production issues is not necessarily true, as black-box control tests may still introduce errors or disruptions to the application if not performed carefully. Requiring less IT staff preparation is not always true, as black-box control tests may still require a lot of planning and documentation to ensure adequate test coverage and quality. Identifying more threats is not necessarily true, as black-box control tests may miss some threats that are hidden in the internal logic or structure of the application.

Which of the following is the BEST justification for making a revision to a password policy?

A.
Vendor recommendation
A.
Vendor recommendation
Answers
B.
Audit recommendation
B.
Audit recommendation
Answers
C.
A risk assessment
C.
A risk assessment
Answers
D.
Industry best practice
D.
Industry best practice
Answers
Suggested answer: C

Explanation:

The best justification for making a revision to a password policy is a risk assessment. A risk assessment is a process of identifying, analyzing, and evaluating the potential threats and vulnerabilities that may affect the confidentiality, integrity, and availability of information assets and systems. By conducting a risk assessment, the organization can determine the appropriate level of security controls and measures to protect its information assets and systems, including password policies. A risk assessment can also help identify any gaps or weaknesses in the existing password policy, and provide recommendations for improvement based on the organization's risk appetite and tolerance. The other options are not the best justification for making a revision to a password policy, although they may be some inputs or outputs of the risk assessment process. A vendor recommendation is an external source of advice or guidance that may or may not be relevant or applicable to the organization's specific context and needs. A vendor recommendation should not be followed blindly without conducting a risk assessment to evaluate its suitability and effectiveness. An audit recommendation is an internal source of feedback or suggestion that may or may not be accurate or complete. An audit recommendation should not be implemented without conducting a risk assessment to verify its validity and feasibility. An industry best practice is a general standard or guideline that may or may not reflect the organization's unique characteristics and requirements. An industry best practice should not be adopted without conducting a risk assessment to customize it according to the organization's goals and priorities

Which of the following BEST enables an information security manager to obtain organizational support for the implementation of security controls?

A.
Conducting periodic vulnerability assessments
A.
Conducting periodic vulnerability assessments
Answers
B.
Communicating business impact analysis (BIA) results
B.
Communicating business impact analysis (BIA) results
Answers
C.
Establishing effective stakeholder relationships
C.
Establishing effective stakeholder relationships
Answers
D.
Defining the organization's risk management framework
D.
Defining the organization's risk management framework
Answers
Suggested answer: C

Explanation:

The best way to obtain organizational support for the implementation of security controls is to establish effective stakeholder relationships. Stakeholders are the individuals or groups that have an interest or influence in the organization's information security objectives, activities, and outcomes. They may include senior management, business owners, users, customers, regulators, auditors, vendors, and others. By establishing effective stakeholder relationships, the information security manager can communicate the value and benefits of security controls to the organization's performance, reputation, and competitiveness. The information security manager can also solicit feedback and input from stakeholders to ensure that the security controls are aligned with the organization's needs and expectations. The information security manager can also foster collaboration and cooperation among stakeholders to facilitate the implementation and operation of security controls. The other options are not the best way to obtain organizational support for the implementation of security controls, although they may be some steps or outcomes of the process. Conducting periodic vulnerability assessments is a technical activity that can help identify and prioritize the security weaknesses and gaps in the organization's information assets and systems. However, it does not necessarily obtain organizational support for the implementation of security controls unless the results are communicated and justified to the stakeholders. Communicating business impact analysis (BIA) results is a reporting activity that can help demonstrate the potential consequences of disruptions or incidents on the organization's critical business processes and functions. However, it does not necessarily obtain organizational support for the implementation of security controls unless the results are linked to the organization's risk appetite and tolerance. Defining the organization's risk management framework is a strategic activity that can help establish the policies, procedures, roles, and responsibilities for managing information security risks in a consistent and effective manner. However, it does not necessarily obtain organizational support for the implementation of security controls unless the framework is endorsed and enforced by the stakeholders

Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?

A.
Projected Increase in maturity level
A.
Projected Increase in maturity level
Answers
B.
Estimated reduction in risk
B.
Estimated reduction in risk
Answers
C.
Projected costs over time
C.
Projected costs over time
Answers
D.
Estimated increase in efficiency
D.
Estimated increase in efficiency
Answers
Suggested answer: B

Explanation:

The best thing to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate is an estimated reduction in risk. Risk reduction is the expected benefit of implementing an information security initiative, as it reduces the likelihood and impact of threats and vulnerabilities that may affect the organization's information assets and systems. By estimating the reduction in risk, the information security manager can demonstrate the value and benefits of the information security initiative to the organization's performance, reputation, and competitiveness. The information security manager can also compare the estimated reduction in risk with the estimated cost of the information security initiative to determine its cost-effectiveness and feasibility. The other options are not the best thing to include in a business case, although they may be some inputs or outputs of the risk assessment process. A projected increase in maturity level is a potential outcome of implementing an information security initiative, as it improves the organization's capabilities and processes for managing information security risks. However, it does not necessarily reflect the actual reduction in risk or the ROI of the information security initiative. A projected cost over time is a component of calculating the ROI of an information security initiative, as it reflects the total cost of ownership and maintenance of the initiative. However, it does not indicate the expected benefit or value of the initiative. An estimated increase in efficiency is a possible benefit of implementing an information security initiative, as it may enhance the organization's productivity and performance. However, it may not be directly related to the reduction in risk or the ROI of the information security initiative.

Which of the following is the MOST important issue in a penetration test?

A.
Having an independent group perform the test
A.
Having an independent group perform the test
Answers
B.
Obtaining permission from audit
B.
Obtaining permission from audit
Answers
C.
Performing the test without the benefit of any insider knowledge
C.
Performing the test without the benefit of any insider knowledge
Answers
D.
Having a defined goal as well as success and failure criteria
D.
Having a defined goal as well as success and failure criteria
Answers
Suggested answer: D

Explanation:

The most important issue in a penetration test is having a defined goal as well as success and failure criteria. A penetration test is a simulated cyber attack against a computer system or an application to check for exploitable vulnerabilities. The goal of a penetration test is to identify and evaluate the security risks and weaknesses of the target system or application, and to provide recommendations for improvement. The success and failure criteria of a penetration test are the metrics and indicators that measure the effectiveness and efficiency of the test, and the extent to which the test achieves its goal. By having a defined goal as well as success and failure criteria, the penetration tester can plan and execute the test in a systematic and structured manner, and can communicate and report the results and findings in a clear and concise way. The other options are not the most important issue in a penetration test, although they may be some factors or considerations that affect the test. Having an independent group perform the test is a desirable practice, as it can provide an unbiased and objective assessment of the target system or application. However, it is not essential, as long as the penetration tester follows ethical hacking principles and standards. Obtaining permission from audit is a mandatory requirement, as it ensures that the penetration test is authorized and compliant with the organization's policies and regulations. However, it is not an issue, as it is a prerequisite for conducting the test. Performing the test without the benefit of any insider knowledge is an optional approach, as it simulates a real-world attack by an external hacker who does not have access to the internal design or configuration of the target system or application. However, it is not always feasible or effective, as some vulnerabilities may be hidden or inaccessible from an outsider's perspective.

Which of the following is the MOST important consideration when determining which type of failover site to employ?

A.
Reciprocal agreements
A.
Reciprocal agreements
Answers
B.
Disaster recovery test results
B.
Disaster recovery test results
Answers
C.
Recovery time objectives (RTOs)
C.
Recovery time objectives (RTOs)
Answers
D.
Data retention requirements
D.
Data retention requirements
Answers
Suggested answer: C

Explanation:

The most important consideration when determining which type of failover site to employ is the recovery time objectives (RTOs). A failover site is a backup site that can be used to restore the functionality and operations of an organization's primary site in the event of a disaster or disruption. There are different types of failover sites, such as hot sites, warm sites, and cold sites, that vary in terms of availability, cost, and complexity. A recovery time objective (RTO) is a metric that defines the maximum acceptable amount of time that an organization can tolerate to restore a system or an application after a disaster or disruption. By determining the RTOs for each system or application, the organization can choose the most suitable type of failover site that can meet its recovery needs and expectations. For example, if the RTO for a critical system is very low, the organization may opt for a hot site that can provide immediate failover and minimal downtime. However, if the RTO for a non-critical system is high, the organization may choose a cold site that requires manual setup and activation, but has lower cost and maintenance. The other options are not the most important consideration when determining which type of failover site to employ, although they may be some factors or constraints that affect the decision. Reciprocal agreements are arrangements between two or more organizations that agree to provide backup facilities or resources to each other in case of a disaster or disruption. Reciprocal agreements can help reduce the cost and complexity of setting up and maintaining a failover site, but they may not guarantee the availability or compatibility of the backup facilities or resources. Disaster recovery test results are outcomes of testing and validating the functionality and performance of a failover site. Disaster recovery test results can help evaluate and improve the effectiveness and efficiency of a failover site, but they do not determine which type of failover site to employ. Data retention requirements are policies and regulations that define how long and in what format an organization must store its data. Data retention requirements can affect the design and configuration of a failover site, but they do not dictate which type of failover site to employ

What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?

A.
Define the issues to be addressed.
A.
Define the issues to be addressed.
Answers
B.
Perform a cost-benefit analysis.
B.
Perform a cost-benefit analysis.
Answers
C.
Calculate the total cost of ownership (TCO).
C.
Calculate the total cost of ownership (TCO).
Answers
D.
Conduct a feasibility study.
D.
Conduct a feasibility study.
Answers
Suggested answer: A

Explanation:

The first step when developing a business case for a new intrusion detection system (IDS) solution is to define the issues to be addressed. A business case is a document that provides the rationale and justification for initiating a project or investment. It typically includes information such as the problem statement, the objectives, the alternatives, the costs and benefits, the risks and assumptions, and the expected outcomes. The first step in developing a business case is to define the issues to be addressed, which means identifying and describing the current situation, the problems or challenges faced by the organization, and the needs or opportunities for improvement. By defining the issues to be addressed, the information security manager can establish the scope and purpose of the business case, and provide a clear and compelling problem statement that explains why a new IDS solution is needed. The other options are not the first step when developing a business case for a new IDS solution, although they may be part of the subsequent steps. Performing a cost-benefit analysis is a step that involves comparing the costs and benefits of different alternatives, including the new IDS solution and the status quo. A cost-benefit analysis can help evaluate and justify the feasibility and desirability of each alternative, and support the decision-making process. Calculating the total cost of ownership (TCO) is a step that involves estimating the direct and indirect costs associated with acquiring, operating, maintaining, and disposing of an asset or a system over its entire life cycle. A TCO calculation can help determine the long-term financial implications of investing in a new IDS solution, and compare it with other alternatives. Conducting a feasibility study is a step that involves assessing the technical, operational, legal, and economic aspects of implementing a project or an investment. A feasibility study can help identify and mitigate any potential issues or risks that may affect the success of the project or investment, and provide recommendations for improvement

Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?

A.
Data owner
A.
Data owner
Answers
B.
Business owner
B.
Business owner
Answers
C.
Information security manager
C.
Information security manager
Answers
D.
Compliance manager
D.
Compliance manager
Answers
Suggested answer: B

Explanation:

The business owner is the most appropriate person to own the risk associated with the failure of a privileged access control because they are ultimately responsible for the protection and use of the information in their business unit1.The data owner is responsible for determining the access rights for specific data sets, but not for the access control mechanisms2.The information security manager is responsible for implementing and enforcing the security policies and standards, but not for owning the risk3.The compliance manager is responsible for ensuring that the organization meets the regulatory requirements, but not for owning the risk3.

Reference:1https://www.cyberark.com/resources/blog/how-do-you-prioritize-risk-for-privileged-access-management3https://www.isaca.org/resources/isaca-journal/issues/2017/volume-1/capability-framework-for-privileged-access-management2https://security.stackexchange.com/questions/218049/what-is-the-difference-between-data-owner-data-custodian-and-system-owner

Which of the following roles is MOST appropriate to determine access rights for specific users of an application?

A.
Data owner
A.
Data owner
Answers
B.
Data custodian
B.
Data custodian
Answers
C.
System administrator
C.
System administrator
Answers
D.
Senior management
D.
Senior management
Answers
Suggested answer: A

Explanation:

The data owner is the most appropriate role to determine access rights for specific users of an application because they have legal rights and complete control over data elements4.They are also responsible for approving data glossaries and definitions, ensuring the accuracy of information, and supervising operations related to data quality5.The data custodian is responsible for the safe custody, transport, and storage of the data and implementation of business rules, but not for determining access rights4.The system administrator is responsible for managing the security and storage infrastructure of data sets according to the organization's data governance policies, but not for determining access rights5.Senior management is responsible for setting the strategic direction and priorities for data governance, but not for determining access rights5.

Reference:5https://www.cpomagazine.com/cyber-security/data-owners-vs-data-stewards-vs-data-custodians-the-3-types-of-data-masters-and-why-you-should-employ-them/4https://cloudgal42.com/data-privacy-difference-between-data-owner-controller-and-data-custodian-processor/

Which of the following metrics provides the BEST evidence of alignment of information security governance with corporate governance?

A.
Average return on investment (ROI) associated with security initiatives
A.
Average return on investment (ROI) associated with security initiatives
Answers
B.
Average number of security incidents across business units
B.
Average number of security incidents across business units
Answers
C.
Mean time to resolution (MTTR) for enterprise-wide security incidents
C.
Mean time to resolution (MTTR) for enterprise-wide security incidents
Answers
D.
Number of vulnerabilities identified for high-risk information assets
D.
Number of vulnerabilities identified for high-risk information assets
Answers
Suggested answer: A

Explanation:

Average return on investment (ROI) associated with security initiatives is the best metric to provide evidence of alignment of information security governance with corporate governance because it demonstrates the value and benefits of security investments to the organization's strategic goals and objectives. Average number of security incidents across business units is not a good metric because it does not measure the effectiveness or efficiency of security initiatives or their alignment with corporate governance. Mean time to resolution (MTTR) for enterprise-wide security incidents is not a good metric because it does not measure the impact or outcome of security initiatives or their alignment with corporate governance. Number of vulnerabilities identified for high-risk information assets is not a good metric because it does not measure the performance or improvement of security initiatives or their alignment with corporate governance.

Reference: https://www.isaca.org/resources/isaca-journal/issues/2015/volume-6/measuring-the-value-of-information-security-investments https://www.isaca.org/resources/isaca-journal/issues/2015/volume-1/how-to-measure-the-effectiveness-of-information-security-governance

Total 793 questions
Go to page: of 80