ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 40

Question list
Search
Search

Which of the following BEST enables the assignment of risk and control ownership?

A.
Aligning to an industry-recognized control framework
A.
Aligning to an industry-recognized control framework
Answers
B.
Adopting a risk management framework
B.
Adopting a risk management framework
Answers
C.
Obtaining senior management buy-in
C.
Obtaining senior management buy-in
Answers
D.
Developing an information security strategy
D.
Developing an information security strategy
Answers
Suggested answer: C

Explanation:

Obtaining senior management buy-in is the best way to enable the assignment of risk and control ownership because it helps to establish the authority and accountability of the risk and control owners, as well as to provide them with the necessary resources and support to perform their roles. Risk and control ownership refers to the assignment of specific responsibilities and accountabilities for managing risks and controls to individuals or groups within the organization. Obtaining senior management buy-in helps to ensure that risk and control ownership is aligned with the organizational objectives, structure, and culture, as well as to communicate the expectations and benefits of risk and control ownership to all stakeholders. Therefore, obtaining senior management buy-in is the correct answer.

https://www.protechtgroup.com/en-au/blog/risk-control-management

https://www.mckinsey.com/~/media/mckinsey/dotcom/client_service/risk/working%20papers/23_getting_risk_ownership_right.ashx

https://www.linkedin.com/pulse/risk-controls-who-owns-them-david-tattam

Which of the following metrics is MOST appropriate for evaluating the incident notification process?

A.
Average total cost of downtime per reported incident
A.
Average total cost of downtime per reported incident
Answers
B.
Elapsed time between response and resolution
B.
Elapsed time between response and resolution
Answers
C.
Average number of incidents per reporting period
C.
Average number of incidents per reporting period
Answers
D.
Elapsed time between detection, reporting, and response
D.
Elapsed time between detection, reporting, and response
Answers
Suggested answer: D

Explanation:

Elapsed time between detection, reporting, and response is the most appropriate metric for evaluating the incident notification process because it measures how quickly and effectively the organization identifies, communicates, and responds to security incidents. The incident notification process is a critical part of the incident response plan that defines the roles and responsibilities, procedures, and channels for reporting and escalating security incidents to the relevant stakeholders. Elapsed time between detection, reporting, and response helps to assess the performance and efficiency of the incident notification process, as well as to identify any bottlenecks or delays that may affect the incident resolution and recovery. Therefore, elapsed time between detection, reporting, and response is the correct answer.

https://www.atlassian.com/incident-management/kpis/common-metrics

https://securityscorecard.com/blog/how-to-use-incident-response-metrics/

https://www.cisa.gov/sites/default/files/publications/Incident-Response-Plan-Basics_508c.pdf

Which of the following would BEST support the business case for an increase in the information security budget?

A.
Cost-benefit analysis results
A.
Cost-benefit analysis results
Answers
B.
Comparison of information security budgets with peer organizations
B.
Comparison of information security budgets with peer organizations
Answers
C.
Business impact analysis (BIA) results
C.
Business impact analysis (BIA) results
Answers
D.
Frequency of information security incidents
D.
Frequency of information security incidents
Answers
Suggested answer: A

Explanation:

Cost-benefit analysis results are the best way to support the business case for an increase in the information security budget because they help to demonstrate the value and return on investment of the proposed security initiatives or projects. A cost-benefit analysis is a method of comparing the costs and benefits of different alternatives or options, taking into account both quantitative and qualitative factors. A cost-benefit analysis helps to justify the need and feasibility of the security budget, as well as to prioritize the security spending based on the expected outcomes and impacts. Therefore, cost-benefit analysis results are the correct answer.

https://www.cisa.gov/resources-tools/resources/business-case-security

https://www.cisa.gov/resources-tools/resources/isc-best-practices-making-business-case-security

https://risk3sixty.com/2020/09/21/how-to-build-a-business-case-for-security-initiatives-part-4/

Which of the following would BEST enable the timely execution of an incident response plan?

A.
The introduction of a decision support tool
A.
The introduction of a decision support tool
Answers
B.
Definition of trigger events
B.
Definition of trigger events
Answers
C.
Clearly defined data classification process
C.
Clearly defined data classification process
Answers
D.
Centralized service desk
D.
Centralized service desk
Answers
Suggested answer: B

Explanation:

Definition of trigger events is the best way to enable the timely execution of an incident response plan because it helps to specify the conditions or criteria that initiate the incident response process. Trigger events are predefined scenarios or indicators that signal the occurrence or potential occurrence of a security incident, such as a ransomware attack, a data breach, a denial-of-service attack, or an unauthorized access attempt. Definition of trigger events helps to ensure that the incident response team is alerted and activated as soon as possible, as well as to determine the appropriate level and scope of response based on the severity and impact of the incident. Therefore, definition of trigger events is the correct answer.

https://www.atlassian.com/incident-management/kpis/common-metrics

https://www.varonis.com/blog/incident-response-plan/

https://holierthantao.com/2023/05/03/minimizing-disruptions-a-comprehensive-guide-to-incident-response-planning-and-execution/

Spoofing should be prevented because it may be used to:

A.
gain illegal entry to a secure system by faking the sender's address,
A.
gain illegal entry to a secure system by faking the sender's address,
Answers
B.
predict which way a program will branch when an option is presented
B.
predict which way a program will branch when an option is presented
Answers
C.
assemble information, track traffic, and identify network vulnerabilities.
C.
assemble information, track traffic, and identify network vulnerabilities.
Answers
D.
capture information such as passwords traveling through the network
D.
capture information such as passwords traveling through the network
Answers
Suggested answer: A

Explanation:

Gaining illegal entry to a secure system by faking the sender's address is one of the reasons why spoofing should be prevented. Spoofing is a technique that involves impersonating someone or something else to deceive or manipulate the recipient or target. Spoofing can be applied to various communication channels, such as emails, websites, phone calls, IP addresses, or DNS servers. One of the common goals of spoofing is to gain unauthorized access to a secure system by faking the sender's address, such as an email address or an IP address. For example, an attacker may spoof an email address of a trusted person or organization and send a phishing email that contains a malicious link or attachment. If the recipient clicks on the link or opens the attachment, they may be redirected to a fake website that asks for their credentials or downloads malware onto their device. Alternatively, an attacker may spoof an IP address of a trusted source and send packets to a secure system that contains malicious code or commands. If the system accepts the packets as legitimate, it may execute the code or commands and compromise its security. Therefore, gaining illegal entry to a secure system by faking the sender's address is one of the reasons why spoofing should be prevented.

https://www.kaspersky.com/resource-center/definitions/spoofing

https://www.cisa.gov/resources-tools/resources/business-case-security

https://www.avast.com/c-spoofing

The PRIMARY consideration when responding to a ransomware attack should be to ensure:

A.
backups are available.
A.
backups are available.
Answers
B.
the most recent patches have been applied.
B.
the most recent patches have been applied.
Answers
C.
the ransomware attack is contained
C.
the ransomware attack is contained
Answers
D.
the business can operate
D.
the business can operate
Answers
Suggested answer: D

Explanation:

Ensuring the business can operate is the primary consideration when responding to a ransomware attack because it helps to minimize the disruption and impact of the attack on the organization's mission-critical functions and services. Ransomware is a type of malware that encrypts the files or systems of the victims and demands payment for their decryption. Ransomware attacks can cause significant operational, financial, and reputational damage to organizations, especially if they affect their core business processes or customer data. Therefore, ensuring the business can operate is the primary consideration when responding to a ransomware attack.

https://www.cisa.gov/stopransomware/ransomware-guide

https://csrc.nist.gov/Projects/ransomware-protection-and-response

https://learn.microsoft.com/en-us/azure/security/fundamentals/ransomware-detect-respond

An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?

A.
Focus the review on the infrastructure with the highest risk
A.
Focus the review on the infrastructure with the highest risk
Answers
B.
Review controls listed in the vendor contract
B.
Review controls listed in the vendor contract
Answers
C.
Determine whether the vendor follows the selected security framework rules
C.
Determine whether the vendor follows the selected security framework rules
Answers
D.
Review the vendor's security policy
D.
Review the vendor's security policy
Answers
Suggested answer: B

Explanation:

Reviewing controls listed in the vendor contract is the most helpful approach for properly scoping the security assessment of an existing vendor because it helps to determine the security requirements and expectations that the vendor has agreed to meet. A vendor contract is a legal document that defines the terms and conditions of the business relationship between the organization and the vendor, including the scope, deliverables, responsibilities, and obligations of both parties. A vendor contract should also specify the security controls that the vendor must implement and maintain to protect the organization's data and systems, such as encryption, authentication, access control, backup, monitoring, auditing, etc. Reviewing controls listed in the vendor contract helps to ensure that the security assessment covers all the relevant aspects of the vendor's security posture, as well as to identify any gaps or discrepancies between the contract and the actual practices. Therefore, reviewing controls listed in the vendor contract is the correct answer.

https://medstack.co/blog/vendor-security-assessments-understanding-the-basics/

https://www.ncsc.gov.uk/files/NCSC-Vendor-Security-Assessment.pdf

https://securityscorecard.com/blog/how-to-conduct-vendor-security-assessment

An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?

A.
Data masking
A.
Data masking
Answers
B.
Data retention strategy
B.
Data retention strategy
Answers
C.
Data encryption standards
C.
Data encryption standards
Answers
D.
Data loss prevention (DLP)
D.
Data loss prevention (DLP)
Answers
Suggested answer: C

Explanation:

Data encryption standards are the best information security initiative for creating an enterprise strategy for protecting data across multiple data repositories and different departments because they help to ensure the confidentiality, integrity, and availability of data in transit and at rest. Data encryption is a process of transforming data into an unreadable format using a secret key or algorithm, so that only authorized parties can access and decrypt it. Data encryption standards are the rules or specifications that define how data encryption should be performed, such as the type, strength, and mode of encryption, the key management and distribution methods, and the compliance requirements. Data encryption standards help to protect data from unauthorized access, modification, or theft, as well as to meet the regulatory obligations for data privacy and security. Therefore, data encryption standards are the correct answer.

https://www.techtarget.com/searchdatabackup/tip/20-keys-to-a-successful-enterprise-data-protection-strategy

https://cloudian.com/guides/data-protection/data-protection-strategy-10-components-of-an-effective-strategy/

https://www.veritas.com/information-center/enterprise-data-protection

Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?

A.
Mobile application control
A.
Mobile application control
Answers
B.
Inconsistent device security
B.
Inconsistent device security
Answers
C.
Configuration management
C.
Configuration management
Answers
D.
End user acceptance
D.
End user acceptance
Answers
Suggested answer: B

Explanation:

Inconsistent device security is the primary challenge for an information security manager when deploying a bring your own device (BYOD) mobile program in an enterprise because it increases the risk of data breaches and compromises. A BYOD mobile program allows employees to use their personal devices, such as smartphones, tablets, or laptops, to access the organization's network, applications, and data. However, personal devices may have different operating systems, versions, configurations, and security settings than the organization's standard devices. Moreover, personal devices may not be updated regularly, may have unauthorized or malicious apps installed, or may not have adequate protection against malware or theft. Inconsistent device security makes it difficult for the information security manager to enforce and monitor the security policies and controls across all devices, as well as to ensure compliance with the regulatory requirements for data privacy and security. Therefore, inconsistent device security is the correct answer.

https://simplemdm.com/blog/challenges-of-bring-your-own-device-byod-policy/

https://www.timedoctor.com/blog/byod-pros-and-cons/

https://www.ncsc.gov.uk/files/NCSC-Vendor-Security-Assessment.pdf

Which of the following would provide the BEST evidence to senior management that security control performance has improved?

A.
Demonstrated return on security investment
A.
Demonstrated return on security investment
Answers
B.
Reduction in inherent risk
B.
Reduction in inherent risk
Answers
C.
Results of an emerging threat analysis
C.
Results of an emerging threat analysis
Answers
D.
Review of security metrics trends
D.
Review of security metrics trends
Answers
Suggested answer: D

Explanation:

Review of security metrics trends is the best evidence to senior management that security control performance has improved because it helps to measure and demonstrate the effectiveness and efficiency of the security controls over time. Security metrics are quantitative or qualitative indicators that provide information about the security status or performance of an organization, system, process, or activity. Security metrics can be used to evaluate the implementation, operation, and outcome of security controls, such as the number of vulnerabilities detected and remediated, the time to respond and recover from incidents, the compliance level with security policies and standards, or the return on security investment. Review of security metrics trends helps to identify and communicate the progress, achievements, and challenges of the security program, as well as to support decision making and continuous improvement. Therefore, review of security metrics trends is the correct answer.

https://www.bitsight.com/blog/importance-continuous-improvement-security-performance-management

https://www.isaca.org/resources/isaca-journal/issues/2020/volume-6/key-performance-indicators-for-security-governance-part-2

https://www.nist.gov/news-events/news/2021/09/dhs-nist-coordinate-releasing-preliminary-cybersecurity-performance-goals.

Total 793 questions
Go to page: of 80