ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 37

Question list
Search
Search

An information security manager has identified that security risks are not being treated in a timely manner. Which of the following?

A.
Provide regular updates about the current state of the risks.
A.
Provide regular updates about the current state of the risks.
Answers
B.
Re-perform risk analysis at regular intervals.
B.
Re-perform risk analysis at regular intervals.
Answers
C.
Assign a risk owner to each risk
C.
Assign a risk owner to each risk
Answers
D.
Create mitigating controls to manage the risks.
D.
Create mitigating controls to manage the risks.
Answers
Suggested answer: B

Explanation:

An email digital signature will verify to recipient the integrity of an email message because it ensures that the message has not been altered or tampered with during transit, and confirms that the message originated from the sender and not an imposter. An email digital signature will not protect the confidentiality of an email message because it does not encrypt or hide the message content from unauthorized parties. An email digital signature will not automatically correct unauthorized modification of an email message because it does not change or restore the message content if it has been altered or tampered with. An email digital signature will not prevent unauthorized modification of an email message because it does not block or stop any attempts to alter or tamper with the message content.

Reference: https://support.microsoft.com/en-us/office/secure-messages-by-using-a-digital-signature-549ca2f1-a68f-4366-85fa-b3f4b5856fc6 https://www.techtarget.com/searchsecurity/definition/digital-signature

An email digital signature will:

A.
protect the confidentiality of an email message.
A.
protect the confidentiality of an email message.
Answers
B.
verify to recipient the integrity of an email message.
B.
verify to recipient the integrity of an email message.
Answers
C.
automatically correct unauthorized modification of an email message.
C.
automatically correct unauthorized modification of an email message.
Answers
D.
prevent unauthorized modification of an email message.
D.
prevent unauthorized modification of an email message.
Answers
Suggested answer: B

Explanation:

An email digital signature will verify to recipient the integrity of an email message because it ensures that the message has not been altered or tampered with during transit, and confirms that the message originated from the sender and not an imposter. An email digital signature will not protect the confidentiality of an email message because it does not encrypt or hide the message content from unauthorized parties. An email digital signature will not automatically correct unauthorized modification of an email message because it does not change or restore the message content if it has been altered or tampered with. An email digital signature will not prevent unauthorized modification of an email message because it does not block or stop any attempts to alter or tamper with the message content.

Reference: https://support.microsoft.com/en-us/office/secure-messages-by-using-a-digital-signature-549ca2f1-a68f-4366-85fa-b3f4b5856fc6 https://www.techtarget.com/searchsecurity/definition/digital-signature

From an information security perspective, legal issues associated with a transborder flow of technology-related items are MOST often

A.
website transactions and taxation.
A.
website transactions and taxation.
Answers
B.
software patches and corporate date.
B.
software patches and corporate date.
Answers
C.
encryption tools and personal data.
C.
encryption tools and personal data.
Answers
D.
lack of competition and free trade.
D.
lack of competition and free trade.
Answers
Suggested answer: C

Explanation:

Encryption tools and personal data are the most often associated with legal issues in the context of transborder flow of technology-related items because they involve the protection of privacy and security of individuals and organizations across different jurisdictions, and may be subject to different laws and regulations that govern their access, use, or transfer. Website transactions and taxation are not very often associated with legal issues in this context because they involve the exchange of goods and services and the collection of taxes across different jurisdictions, which may not be directly related to technology transfer or data flow. Software patches and corporate data are not very often associated with legal issues in this context because they involve the maintenance and improvement of software functionality and the management and sharing of business information, which may not be directly related to technology transfer or data flow. Lack of competition and free trade are not very often associated with legal issues in this context because they involve the market structure and trade policies of different jurisdictions, which may not be directly related to technology transfer or data flow.

Reference: https://www.oecd-ilibrary.org/science-and-technology/oecd-declaration-on-transborder-data-flows_230240624407 https://legalinstruments.oecd.org/public/doc/108/108.en.pdf

Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?

A.
The strategy aligns with management's acceptable level of risk.
A.
The strategy aligns with management's acceptable level of risk.
Answers
B.
The strategy addresses ineffective information security controls.
B.
The strategy addresses ineffective information security controls.
Answers
C.
The strategy aligns with industry benchmarks and standards.
C.
The strategy aligns with industry benchmarks and standards.
Answers
D.
The strategy addresses organizational maturity and the threat environment.
D.
The strategy addresses organizational maturity and the threat environment.
Answers
Suggested answer: A

Explanation:

The most important factor to obtain senior leadership support when presenting an information security strategy is that the strategy aligns with management's acceptable level of risk because it ensures that the strategy is consistent and compatible with the organization's risk appetite and thresholds, and reflects management's expectations and priorities for security risk management. The strategy addresses ineffective information security controls is not a very important factor because it does not indicate how the strategy will improve or enhance the security controls or performance. The strategy aligns with industry benchmarks and standards is not a very important factor because it does not indicate how the strategy will differentiate or innovate the organization's security capabilities or practices. The strategy addresses organizational maturity and the threat environment is not a very important factor because it does not indicate how the strategy will advance or adapt the organization's security posture or resilience.

Reference: https://www.isaca.org/resources/isaca-journal/issues/2016/volume-4/technical-security-standards-for-information-systems https://www.isaca.org/resources/isaca-journal/issues/2017/volume-2/how-to-align-security-initiatives-with-business-goals-and-objectives

The MOST important information for influencing management's support of information security is:

A.
an demonstration of alignment with the business strategy.
A.
an demonstration of alignment with the business strategy.
Answers
B.
An identification of the overall threat landscape.
B.
An identification of the overall threat landscape.
Answers
C.
A report of a successful attack on a competitor.
C.
A report of a successful attack on a competitor.
Answers
D.
An identification of organizational risks.
D.
An identification of organizational risks.
Answers
Suggested answer: A

Explanation:

The most important information for influencing management's support of information security is an demonstration of alignment with the business strategy because it shows how information security contributes to the achievement of the organization's goals and objectives, and adds value to the organization's performance and competitiveness. An identification of the overall threat landscape is not very important because it does not indicate how information security addresses or mitigates the threats or risks. A report of a successful attack on a competitor is not very important because it does not indicate how information security prevents or responds to such attacks. An identification of organizational risks is not very important because it does not indicate how information security manages or reduces the risks.

Reference: https://www.isaca.org/resources/isaca-journal/issues/2016/volume-4/technical-security-standards-for-information-systems https://www.isaca.org/resources/isaca-journal/issues/2017/volume-2/how-to-align-security-initiatives-with-business-goals-and-objectives

An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?

A.
Conduct a risk assessment and share the result with senior management.
A.
Conduct a risk assessment and share the result with senior management.
Answers
B.
Revise the incident response plan-to align with business processes.
B.
Revise the incident response plan-to align with business processes.
Answers
C.
Provide incident response training to data custodians.
C.
Provide incident response training to data custodians.
Answers
D.
Provide incident response training to data owners.
D.
Provide incident response training to data owners.
Answers
Suggested answer: C

Explanation:

The best action for the system admin manager to address the issue of negligent handling of incident alerts by system admins is to provide incident response training to data custodians because it helps to improve their awareness and skills in recognizing and reporting security incidents, and following the incident response procedures and protocols. Conducting a risk assessment and sharing the result with senior management is not a good action because it does not address the root cause of the issue or provide any solutions or improvements. Revising the incident response plan to align with business processes is not a good action because it does not address the root cause of the issue or provide any solutions or improvements. Providing incident response training to data owners is not a good action because data owners are not responsible for handling incident alerts or performing incident response tasks.

Reference: https://www.isaca.org/resources/isaca-journal/issues/2017/volume-5/incident-response-lessons-learned https://www.isaca.org/resources/isaca-journal/issues/2018/volume-3/incident-response-lessons-learned

Which of the following has the GREATEST influence on the successful integration of information security within the business?

A.
Organizational structure and culture
A.
Organizational structure and culture
Answers
B.
Risk tolerance and organizational objectives
B.
Risk tolerance and organizational objectives
Answers
C.
The desired state of the organization
C.
The desired state of the organization
Answers
D.
Information security personnel
D.
Information security personnel
Answers
Suggested answer: A

Explanation:

The factor that has the greatest influence on the successful integration of information security within the business is organizational structure and culture because they determine how information security is organized, governed, and supported within the organization, and how information security roles and responsibilities are defined, assigned, and communicated across different levels and functions. Risk tolerance and organizational objectives are not very influential because they do not affect how information security is integrated within the business, but rather what information security aims to achieve or protect. The desired state of the organization is not very influential because it does not affect how information security is integrated within the business, but rather what the organization aspires to be or do. Information security personnel are not very influential because they do not affect how information security is integrated within the business, but rather who performs information security tasks or activities.

Reference: https://www.isaca.org/resources/isaca-journal/issues/2016/volume-4/technical-security-standards-for-information-systems https://www.isaca.org/resources/isaca-journal/issues/2017/volume-2/how-to-align-security-initiatives-with-business-goals-and-objectives

Which of the following BEST supports effective communication during information security incidents7

A.
Frequent incident response training sessions
A.
Frequent incident response training sessions
Answers
B.
Centralized control monitoring capabilities
B.
Centralized control monitoring capabilities
Answers
C.
Responsibilities defined within role descriptions
C.
Responsibilities defined within role descriptions
Answers
D.
Predetermined service level agreements (SLAs)
D.
Predetermined service level agreements (SLAs)
Answers
Suggested answer: D

Explanation:

The best way to support effective communication during information security incidents is to have predetermined service level agreements (SLAs) because they define the expectations and responsibilities of the parties involved in the incident response process, and specify the communication channels, methods, and frequency for reporting and updating on the incident status and resolution. Frequent incident response training sessions are not very effective because they do not address the communication needs or challenges during an actual incident. Centralized control monitoring capabilities are not very effective because they do not address the communication needs or challenges during an actual incident. Responsibilities defined within role descriptions are not very effective because they do not address the communication needs or challenges during an actual incident.

Reference: https://www.isaca.org/resources/isaca-journal/issues/2017/volume-5/incident-response-lessons-learned https://www.isaca.org/resources/isaca-journal/issues/2018/volume-3/incident-response-lessons-learned

Which of the following should include contact information for representatives of equipment and software vendors?

A.
Information security program charter
A.
Information security program charter
Answers
B.
Business impact analysis (BIA)
B.
Business impact analysis (BIA)
Answers
C.
Service level agreements (SLAs)
C.
Service level agreements (SLAs)
Answers
D.
Business continuity plan (BCP)
D.
Business continuity plan (BCP)
Answers
Suggested answer: D

Explanation:

The document that should include contact information for representatives of equipment and software vendors is the business continuity plan (BCP) because it provides the guidance and procedures for restoring the organization's critical business functions and operations in the event of a disruption or disaster, and may require contacting external parties such as vendors for assistance or support. Information security program charter is not a good document for this purpose because it does not provide any guidance or procedures for business continuity or disaster recovery. Business impact analysis (BIA) is not a good document for this purpose because it does not provide any guidance or procedures for business continuity or disaster recovery. Service level agreements (SLAs) are not good documents for this purpose because they do not provide any guidance or procedures for business continuity or disaster recovery.

Reference: https://www.isaca.org/resources/isaca-journal/issues/2017/volume-2/business-continuity-management-lifecycle https://www.isaca.org/resources/isaca-journal/issues/2016/volume-4/business-impact-analysis

Which of the following should be triggered FIRST when unknown malware has infected an organization's critical system?

A.
Incident response plan
A.
Incident response plan
Answers
B.
Disaster recovery plan (DRP)
B.
Disaster recovery plan (DRP)
Answers
C.
Business continuity plan (BCP)
C.
Business continuity plan (BCP)
Answers
D.
Vulnerability management plan
D.
Vulnerability management plan
Answers
Suggested answer: A

Explanation:

The document that should be triggered first when unknown malware has infected an organization's critical system is the incident response plan because it defines the roles and responsibilities, procedures and protocols, tools and techniques for responding to and managing a security incident effectively and efficiently. Disaster recovery plan (DRP) is not a good document for this purpose because it focuses on restoring the organization's critical systems and operations after a major disruption or disaster, which may not be necessary or appropriate at this stage. Business continuity plan (BCP) is not a good document for this purpose because it focuses on restoring the organization's critical business functions and operations after a major disruption or disaster, which may not be necessary or appropriate at this stage. Vulnerability management plan is not a good document for this purpose because it focuses on identifying and evaluating the security weaknesses or exposures of the organization's systems and assets, which may not be relevant or helpful at this stage.

Reference: https://www.isaca.org/resources/isaca-journal/issues/2017/volume-5/incident-response-lessons-learned https://www.isaca.org/resources/isaca-journal/issues/2018/volume-3/incident-response-lessons-learned

Total 793 questions
Go to page: of 80