ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 39

Question list
Search
Search

List of questions

Search

Which of the following is MOST helpful in determining the criticality of an organization's business functions?

A.
Disaster recovery plan (DRP)
A.
Disaster recovery plan (DRP)
Answers
B.
Business impact analysis (BIA)
B.
Business impact analysis (BIA)
Answers
C.
Business continuity plan (BCP)
C.
Business continuity plan (BCP)
Answers
D.
Security assessment report (SAR)
D.
Security assessment report (SAR)
Answers
Suggested answer: B

Explanation:

Business impact analysis (BIA) is the most helpful in determining the criticality of an organization's business functions because it is a process of identifying and evaluating the potential effects of disruptions or interruptions to those functions. BIA helps to prioritize the recovery of the most critical functions and to estimate the resources and time needed for the recovery. Therefore, business impact analysis (BIA) is the correct answer.

https://www.linkedin.com/pulse/business-continuity-critical-functions-tino-marquez

https://www.techtarget.com/searchitchannel/feature/Business-impact-analysis-for-business-continuity-Understanding-impact-criticality

An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:

A.
perform a gap analysis.
A.
perform a gap analysis.
Answers
B.
implement both companies' policies separately
B.
implement both companies' policies separately
Answers
C.
merge both companies' policies
C.
merge both companies' policies
Answers
D.
perform a vulnerability assessment
D.
perform a vulnerability assessment
Answers
Suggested answer: A

Explanation:

Performing a gap analysis is the first step to ensure the security policy framework encompasses the new business model because it is a process of comparing the current state of security policies and controls with the desired or required state. A gap analysis helps to identify the strengths and weaknesses of the existing security policy framework, as well as the opportunities and threats posed by the new business model. A gap analysis also helps to prioritize the actions and resources needed to close the gaps and align the security policy framework with the new business objectives and requirements. Therefore, performing a gap analysis is the correct answer.

https://secureframe.com/blog/security-frameworks

https://www.techtarget.com/searchsecurity/tip/IT-security-frameworks-and-standards-Choosing-the-right-one

Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?

A.
Develop a personal device policy
A.
Develop a personal device policy
Answers
B.
Implement a mobile device management (MDM) solution
B.
Implement a mobile device management (MDM) solution
Answers
C.
Develop training specific to BYOD awareness
C.
Develop training specific to BYOD awareness
Answers
D.
Define control requirements
D.
Define control requirements
Answers
Suggested answer: D

Explanation:

Defining control requirements is the next step to ensure the security policy framework encompasses the new business model because it is a process of identifying and specifying the security measures and standards that are needed to protect the data and applications accessed by the BYOD devices. Defining control requirements helps to establish the baseline security level and expectations for the BYOD strategy, as well as to align them with the business objectives and risks. Therefore, defining control requirements is the correct answer.

https://www.digitalguardian.com/blog/ultimate-guide-byod-security-overcoming-challenges-creating-effective-policies-and-mitigating

https://learn.microsoft.com/en-us/mem/intune/fundamentals/byod-technology-decisions

Which of the following is BEST used to determine the maturity of an information security program?

A.
Security budget allocation
A.
Security budget allocation
Answers
B.
Organizational risk appetite
B.
Organizational risk appetite
Answers
C.
Risk assessment results
C.
Risk assessment results
Answers
D.
Security metrics
D.
Security metrics
Answers
Suggested answer: D

Explanation:

Security metrics are the best way to determine the maturity of an information security program because they are quantifiable indicators of the performance and effectiveness of the security controls and processes. Security metrics help to evaluate the current state of security, identify gaps and weaknesses, measure progress and improvement, and communicate the value and impact of security to stakeholders. Therefore, security metrics are the correct answer.

https://www.isaca.org/resources/isaca-journal/issues/2020/volume-6/key-performance-indicators-for-security-governance-part-1

https://www.gartner.com/en/publications/protect-your-business-assets-with-roadmap-for-maturing-information-security

Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?

A.
Implement a data loss prevention (DLP) system
A.
Implement a data loss prevention (DLP) system
Answers
B.
Disable all incoming cloud mail services
B.
Disable all incoming cloud mail services
Answers
C.
Conduct awareness training across the organization
C.
Conduct awareness training across the organization
Answers
D.
Require acknowledgment of the acceptable use policy
D.
Require acknowledgment of the acceptable use policy
Answers
Suggested answer: C

Explanation:

Conducting awareness training across the organization is the best way to reduce the risk of security incidents from targeted email attacks because it helps to educate and empower the employees to recognize and avoid falling for such attacks. Targeted email attacks, such as phishing, spear phishing, or business email compromise, rely on social engineering techniques to deceive and manipulate the recipients into clicking on malicious links, opening malicious attachments, or disclosing sensitive information. Awareness training can help to raise the level of security culture and behavior among the employees, as well as to provide them with practical tips and best practices to protect themselves and the organization from targeted email attacks. Therefore, conducting awareness training across the organization is the correct answer.

https://almanac.upenn.edu/articles/one-step-ahead-dont-get-caught-by-targeted-email-attacks

https://www.microsoft.com/en-us/security/business/security-101/what-is-business-email-compromise-bec

https://www.csoonline.com/article/3334617/what-is-spear-phishing-examples-tactics-and-techniques.html

When implementing a security policy for an organization handling personally identifiable information (Pll); the MOST important objective should be:

A.
strong encryption
A.
strong encryption
Answers
B.
regulatory compliance.
B.
regulatory compliance.
Answers
C.
data availability.
C.
data availability.
Answers
D.
security awareness training
D.
security awareness training
Answers
Suggested answer: B

Explanation:

Regulatory compliance is the most important objective when implementing a security policy for an organization handling personally identifiable information (PII) because it helps to ensure that the organization meets the legal and ethical obligations to protect the privacy and security of PII. PII is any information that can be used to identify, contact, or locate an individual, such as name, address, email, phone number, social security number, etc. PII is subject to various laws and regulations in different jurisdictions, such as the General Data Protection Regulation (GDPR) in the European Union, the California Consumer Privacy Act (CCPA) in the United States, or the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada. Failing to comply with these regulations can result in fines, lawsuits, reputational damage, or loss of trust. Therefore, regulatory compliance is the correct answer.

https://www.iso.org/obp/ui/en/#iso:std:iso-iec:27018:ed-2:v1:en

https://www.digitalguardian.com/blog/how-secure-personally-identifiable-information-against-loss-or-compromise

https://blog.rsisecurity.com/how-to-make-a-personally-identifiable-information-policy/

A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?

A.
Perform a backup of the hard drive using backup utilities.
A.
Perform a backup of the hard drive using backup utilities.
Answers
B.
Perform a bit-by-bit backup of the hard disk using a write-blocking device
B.
Perform a bit-by-bit backup of the hard disk using a write-blocking device
Answers
C.
Perform a backup of the computer using the network
C.
Perform a backup of the computer using the network
Answers
D.
Reboot the system using third-party forensic software in the CD-ROM drive
D.
Reboot the system using third-party forensic software in the CD-ROM drive
Answers
Suggested answer: B

Explanation:

Performing a bit-by-bit backup of the hard disk using a write-blocking device is the first step to do when a forensic examination of a PC is required, but the PC has been switched off because it helps to create a forensically sound copy of the original evidence without altering or damaging it. A bit-by-bit backup, also known as a physical or raw image, is a complete copy of every bit on the hard disk, including the unallocated or deleted data. A write-blocking device is a hardware or software tool that prevents any write operations to the hard disk, such as updating timestamps or changing file attributes. Performing a bit-by-bit backup of the hard disk using a write-blocking device ensures the integrity and authenticity of the evidence and allows the forensic analysis to be conducted on the duplicate image rather than the original source. Therefore, performing a bit-by-bit backup of the hard disk using a write-blocking device is the correct answer.

https://en.wikipedia.org/wiki/Computer_forensics

https://resources.infosecinstitute.com/topic/computer-forensics-forensic-analysis-examination-planning/

https://www.computer-forensics-recruiter.com/topics/examination_steps/

Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?

A.
Compartmentalization
A.
Compartmentalization
Answers
B.
Overlapping redundancy
B.
Overlapping redundancy
Answers
C.
Continuous monitoring
C.
Continuous monitoring
Answers
D.
Multi-factor authentication
D.
Multi-factor authentication
Answers
Suggested answer: A

Explanation:

Compartmentalization is the best defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns because it is a strategy that divides the network or system into smaller segments or compartments, each with its own security policies, controls, and access rules. Compartmentalization helps to isolate and protect the most sensitive or critical data and functions from unauthorized or malicious access, as well as to limit the damage or impact of a breach or compromise. Compartmentalization also helps to enforce the principle of least privilege, which grants users or processes only the minimum access rights they need to perform their tasks. Therefore, compartmentalization is the correct answer.

https://www.csoonline.com/article/3667476/defense-in-depth-explained-layering-tools-and-processes-for-better-security.html

https://www.fortinet.com/resources/cyberglossary/defense-in-depth

https://sciencepublishinggroup.com/journal/paperinfo?journalid=542&doi=10.11648/j.ajai.20190302.11

Which of the following is MOST important to have in place for an organization's information security program to be effective?

A.
Documented information security processes
A.
Documented information security processes
Answers
B.
A comprehensive IT strategy
B.
A comprehensive IT strategy
Answers
C.
Senior management support
C.
Senior management support
Answers
D.
Defined and allocated budget
D.
Defined and allocated budget
Answers
Suggested answer: C

Explanation:

Senior management support is the most important factor to have in place for an organization's information security program to be effective because it helps to establish the vision, direction, and goals of the program, as well as to allocate the necessary resources and authority to implement and maintain it. Senior management support also helps to foster a security culture within the organization, where security is seen as a shared responsibility and a business enabler. Senior management support also helps to ensure compliance with internal and external security policies and standards, as well as to communicate the value and impact of security to stakeholders. Therefore, senior management support is the correct answer.

https://www.isaca.org/resources/isaca-journal/issues/2020/volume-6/key-performance-indicators-for-security-governance-part-1

https://www.ffiec.gov/press/PDF/FFIEC_IT_Handbook_Information_Security_Booklet.pdf

https://www.cdse.edu/Portals/124/Documents/student-guides/IF011-guide.pdf?ver=UA7IDZRN_y066rLB8oAW_w%3d%3d

While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?

A.
While responding to the incident
A.
While responding to the incident
Answers
B.
During a tabletop exercise
B.
During a tabletop exercise
Answers
C.
During post-incident review
C.
During post-incident review
Answers
D.
After a risk reassessment
D.
After a risk reassessment
Answers
Suggested answer: C

Explanation:

During post-incident review is the best time to update the incident response plan after observing several deficiencies in the current plan while responding to a high-profile security incident. A post-incident review is a process of analyzing and evaluating the incident response activities, identifying the lessons learned, and documenting the recommendations and action items for improvement. Updating the incident response plan during post-incident review helps to ensure that the plan reflects the current best practices, addresses the gaps and weaknesses, and incorporates the feedback and suggestions from the incident response team and other stakeholders. Therefore, during post-incident review is the correct answer.

https://www.cisa.gov/sites/default/files/publications/Incident-Response-Plan-Basics_508c.pdf

https://www.techtarget.com/searchsecurity/feature/5-critical-steps-to-creating-an-effective-incident-response-plan

https://www.integrify.com/blog/posts/incident-response-plan-need-an-update/

Total 793 questions
Go to page: of 80