ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

A finance department director has decided to outsource the organization's budget application and has identified potential providers. Which of the following actions should be initiated FIRST by IN information security manager?

A.
Determine the required security controls for the new solution
A.
Determine the required security controls for the new solution
Answers
B.
Review the disaster recovery plans (DRPs) of the providers
B.
Review the disaster recovery plans (DRPs) of the providers
Answers
C.
Obtain audit reports on the service providers' hosting environment
C.
Obtain audit reports on the service providers' hosting environment
Answers
D.
Align the roles of the organization's and the service providers' stats.
D.
Align the roles of the organization's and the service providers' stats.
Answers
Suggested answer: A

Explanation:

Before outsourcing any application or service, an information security manager should first determine the required security controls for the new solution, based on the organization's risk appetite, security policies and standards, and regulatory requirements. This will help to evaluate and select the most suitable provider, as well as to define the security roles and responsibilities, service level agreements (SLAs), and audit requirements.

Reference: https://www.isaca.org/credentialing/cism https://www.wiley.com/en-us/CISM+Certified+Information+Security+Manager+Study+Guide-p-9781119801948

Which of the following is the BEST way lo monitor for advanced persistent threats (APT) in an organization?

A.
Network with peers in the industry to share information.
A.
Network with peers in the industry to share information.
Answers
B.
Browse the Internet to team of potential events
B.
Browse the Internet to team of potential events
Answers
C.
Search for anomalies in the environment
C.
Search for anomalies in the environment
Answers
D.
Search for threat signatures in the environment.
D.
Search for threat signatures in the environment.
Answers
Suggested answer: C

Explanation:

An advanced persistent threat (APT) is a stealthy and sophisticated attack that aims to compromise and maintain access to a target network or system over a long period of time, often for espionage or sabotage purposes. APTs are difficult to detect by conventional security tools, such as antivirus or firewalls, that rely on signatures or rules to identify threats. Therefore, the best way to monitor for APTs is to search for anomalies in the environment, such as unusual network traffic, user behavior, file activity, or system configuration changes, that may indicate a compromise or an ongoing attack.

Reference: https://www.isaca.org/credentialing/cism https://www.nist.gov/publications/information-security-handbook-guide-managers

Which of the following should an information security manager do FIRST after a new cybersecunty regulation has been introduced?

A.
Conduct a cost-benefit analysis.
A.
Conduct a cost-benefit analysis.
Answers
B.
Consult corporate legal counsel
B.
Consult corporate legal counsel
Answers
C.
Update the information security policy.
C.
Update the information security policy.
Answers
D.
Perform a gap analysis.
D.
Perform a gap analysis.
Answers
Suggested answer: D

Explanation:

When a new cybersecurity regulation has been introduced, an information security manager should first consult corporate legal counsel to understand the scope, applicability, and implications of the regulation for the organization. Legal counsel can also advise on the compliance obligations and deadlines, as well as the potential penalties or sanctions for non-compliance. Based on this information, the information security manager can then perform a gap analysis to assess the current state of compliance and identify any areas that need improvement. The information security policy can then be updated accordingly to reflect the new regulatory requirements.

Reference: https://www.isaca.org/credentialing/cism https://www.wiley.com/en-us/CISM+Certified+Information+Security+Manager+Study+Guide-p-9781119801948

In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?

A.
Ownership of security
A.
Ownership of security
Answers
B.
Compliance with policies
B.
Compliance with policies
Answers
C.
Auditability of systems
C.
Auditability of systems
Answers
D.
Allocation of training resources
D.
Allocation of training resources
Answers
Suggested answer: A

Explanation:

Information security governance is the process of establishing and maintaining a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. In addition to executive sponsorship and business alignment, a critical factor for effective information security governance is ownership of security, which means that the roles and responsibilities for information security are clearly defined and assigned to the appropriate stakeholders, such as business owners, information owners, information custodians, and users. Ownership of security also implies accountability for the protection of information assets and the management of security risks.

Reference: https://www.isaca.org/credentialing/cism https://www.nist.gov/publications/information-security-handbook-guide-managers

An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''

A.
Deploy mobile device management (MDM)
A.
Deploy mobile device management (MDM)
Answers
B.
Implement remote wipe capability.
B.
Implement remote wipe capability.
Answers
C.
Create an acceptable use policy.
C.
Create an acceptable use policy.
Answers
D.
Conduct a mobile device risk assessment
D.
Conduct a mobile device risk assessment
Answers
Suggested answer: D

Explanation:

A key risk indicator (KRI) is a metric that provides an early warning of potential exposure to a risk. A KRI should be relevant, measurable, timely, and actionable. The most important factor in an organization's selection of a KRI is the criticality of information, which means that the KRI should reflect the value and sensitivity of the information assets that are exposed to the risk. For example, a KRI for data breach risk could be the number of unauthorized access attempts to a database that contains confidential customer data. The criticality of information helps to prioritize the risks and focus on the most significant ones.

Reference: https://www.isaca.org/credentialing/cism https://www.wiley.com/en-us/CISM+Certified+Information+Security+Manager+Study+Guide-p-9781119801948

Which of the following is the MOST important factor in an organization's selection of a key risk indicator (KRI)?

A.
Return on investment (ROI)
A.
Return on investment (ROI)
Answers
B.
Compliance requirements
B.
Compliance requirements
Answers
C.
Target audience
C.
Target audience
Answers
D.
Criticality of information
D.
Criticality of information
Answers
Suggested answer: D

Explanation:

A key risk indicator (KRI) is a metric that provides an early warning of potential exposure to a risk. A KRI should be relevant, measurable, timely, and actionable. The most important factor in an organization's selection of a KRI is the criticality of information, which means that the KRI should reflect the value and sensitivity of the information assets that are exposed to the risk. For example, a KRI for data breach risk could be the number of unauthorized access attempts to a database that contains confidential customer data. The criticality of information helps to prioritize the risks and focus on the most significant ones.

Reference: https://www.isaca.org/credentialing/cism https://www.wiley.com/en-us/CISM+Certified+Information+Security+Manager+Study+Guide-p-9781119801948

Which of the following BEST enables an organization to effectively manage emerging cyber risk?

A.
Periodic internal and external audits
A.
Periodic internal and external audits
Answers
B.
Clear lines of responsibility
B.
Clear lines of responsibility
Answers
C.
Sufficient cyber budget allocation
C.
Sufficient cyber budget allocation
Answers
D.
Cybersecurity policies
D.
Cybersecurity policies
Answers
Suggested answer: D

Explanation:

Cybersecurity policies are the high-level statements that define the organization's objectives, principles, and expectations for protecting its information assets from cyber threats. Cybersecurity policies provide the foundation for developing and implementing cybersecurity strategies, plans, procedures, standards, and guidelines. However, cybersecurity policies alone are not enough to ensure effective cybersecurity. The organization also needs to allocate sufficient budget resources to support the implementation and maintenance of cybersecurity controls, such as hardware, software, personnel, training, testing, auditing, and incident response. Sufficient cyber budget allocation demonstrates the organization's commitment to cybersecurity and enables it to achieve its cybersecurity goals.

Reference: https://www.isaca.org/credentialing/cism https://www.wiley.com/en-us/CISM+Certified+Information+Security+Manager+Study+Guide-p-9781119801948

After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?

A.
Eradication B Recovery
A.
Eradication B Recovery
Answers
B.
Lessons learned review
B.
Lessons learned review
Answers
C.
Incident declaration
C.
Incident declaration
Answers
Suggested answer: A

Explanation:

Eradication is the phase of incident response where the incident team removes the threat from the affected systems and restores them to a secure state. If this phase is not successful, the malware may persist or reappear on the systems, causing further damage or compromise. Therefore, eradication is the correct answer.

https://www.securitymetrics.com/blog/6-phases-incident-response-plan

https://www.atlassian.com/incident-management/incident-response

https://eccouncil.org/cybersecurity-exchange/incident-handling/what-is-incident-response-life-cycle/

An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?

A.
Security requirements are included in the vendor contract
A.
Security requirements are included in the vendor contract
Answers
B.
External security audit results are reviewed.
B.
External security audit results are reviewed.
Answers
C.
Service level agreements (SLAs) meet operational standards.
C.
Service level agreements (SLAs) meet operational standards.
Answers
D.
Business continuity contingency planning is provided
D.
Business continuity contingency planning is provided
Answers
Suggested answer: A

Explanation:

Security requirements are included in the vendor contract is the primary focus of the information security manager when outsourcing IT operations because it ensures that the vendor is legally bound to comply with the client's security policies and standards, as well as any external regulations or laws. This also helps to define the roles and responsibilities of both parties, the security metrics and controls to be used, and the penalties for non-compliance or breach. Therefore, security requirements are included in the vendor contract is the correct answer.

https://www.techtarget.com/searchsecurity/tip/15-benefits-of-outsourcing-your-cybersecurity-operations

https://www.sciencedirect.com/science/article/pii/S0378720616302166

A penetration test against an organization's external web application shows several vulnerabilities. Which of the following presents the GREATEST concern?

A.
A rules of engagement form was not signed prior to the penetration test
A.
A rules of engagement form was not signed prior to the penetration test
Answers
B.
Vulnerabilities were not found by internal tests
B.
Vulnerabilities were not found by internal tests
Answers
C.
Vulnerabilities were caused by insufficient user acceptance testing (UAT)
C.
Vulnerabilities were caused by insufficient user acceptance testing (UAT)
Answers
D.
Exploit code for one of the vulnerabilities is publicly available
D.
Exploit code for one of the vulnerabilities is publicly available
Answers
Suggested answer: D

Explanation:

Exploit code for one of the vulnerabilities is publicly available presents the greatest concern because it means that anyone can easily exploit the vulnerability and compromise the web application. This increases the risk of data breach, denial of service, or other malicious attacks. Therefore, exploit code for one of the vulnerabilities is publicly available is the correct answer.

https://www.imperva.com/learn/application-security/penetration-testing/

https://www.netspi.com/blog/technical/web-application-penetration-testing/are-you-testing-your-web-application-for-vulnerabilities/

Total 793 questions
Go to page: of 80