ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 41

Question list
Search
Search

List of questions

Search

Which of the following is MOST important when defining how an information security budget should be allocated?

A.
Regulatory compliance standards
A.
Regulatory compliance standards
Answers
B.
Information security strategy
B.
Information security strategy
Answers
C.
Information security policy
C.
Information security policy
Answers
D.
Business impact assessment
D.
Business impact assessment
Answers
Suggested answer: B

Explanation:

Information security strategy is the most important factor when defining how an information security budget should be allocated because it helps to align the security objectives and initiatives with the business goals and priorities. An information security strategy is a high-level plan that defines the vision, mission, scope, and direction of the security program, as well as the roles and responsibilities, governance structures, policies and standards, risk management approaches, and performance measurement methods. An information security strategy helps to identify and prioritize the security needs and requirements of the organization, as well as to allocate the resources and funding accordingly. An information security strategy also helps to communicate the value and benefits of security to the stakeholders and justify the security investments. Therefore, information security strategy is the correct answer.

https://www.techtarget.com/searchsecurity/tip/Cybersecurity-budget-breakdown-and-best-practices

https://www.csoonline.com/article/3671108/how-2023-cybersecurity-budget-allocations-are-shaping-up.html

https://www.statista.com/statistics/1319677/companies-it-budget-allocated-to-security-worldwide/

An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:

A.
a directory of approved local media contacts
A.
a directory of approved local media contacts
Answers
B.
pre-prepared media statements
B.
pre-prepared media statements
Answers
C.
procedures to contact law enforcement
C.
procedures to contact law enforcement
Answers
D.
a single point of contact within the organization
D.
a single point of contact within the organization
Answers
Suggested answer: D

Explanation:

A single point of contact within the organization is the most important element to include when incorporating media communication procedures into the security incident communication plan because it helps to ensure a consistent and accurate message to the public and avoid confusion or misinformation. A single point of contact is a designated person who is authorized and trained to communicate with the media on behalf of the organization during a security incident. The single point of contact should coordinate with the incident response team, senior management, legal counsel, and public relations to prepare and deliver timely and appropriate statements to the media, as well as to respond to any inquiries or requests. A single point of contact also helps to prevent unauthorized or conflicting disclosures from other employees or stakeholders that may harm the organization's reputation or legal position. Therefore, a single point of contact within the organization is the correct answer.

https://www.lifars.com/2020/09/communication-during-incident-response/

https://ifpo.org/resource-links/articles-and-reports/public-and-media-relations/planning-for-effective-media-relations-during-a-critical-incident/

https://www.techtarget.com/searchsecurity/tip/Incident-response-How-to-implement-a-communication-plan.

Which of the following is the PRIMARY benefit of an information security awareness training program?

A.
Influencing human behavior
A.
Influencing human behavior
Answers
B.
Evaluating organizational security culture
B.
Evaluating organizational security culture
Answers
C.
Defining risk accountability
C.
Defining risk accountability
Answers
D.
Enforcing security policy
D.
Enforcing security policy
Answers
Suggested answer: A

Explanation:

Influencing human behavior is the primary benefit of an information security awareness training program because it helps to reduce the human errors and vulnerabilities that can compromise the security of data and systems. An information security awareness training program is a process or a program that informs and empowers users to protect data and computing assets from security risks and cyberattacks. It includes educational offerings that cover regulatory requirements, compliance policies, and safe computing practices. An information security awareness training program helps to influence human behavior by raising awareness of the security threats and challenges, enhancing knowledge and skills of the security best practices and controls, and fostering a positive security culture and attitude among the users. By influencing human behavior, an information security awareness training program can improve the security posture and performance of the organization, as well as prevent or mitigate the impact of security incidents. Therefore, influencing human behavior is the correct answer.

https://www.isms.online/iso-27002/control-6-3-information-security-awareness-education-and-training/

https://www.isaca.org/resources/isaca-journal/issues/2019/volume-1/the-benefits-of-information-security-and-privacy-awareness-training-programs

https://threatcop.com/blog/benefits-and-purpose-of-security-awareness-training/.

A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?

A.
Mitigate
A.
Mitigate
Answers
B.
Accept
B.
Accept
Answers
C.
Transfer
C.
Transfer
Answers
D.
Avoid
D.
Avoid
Answers
Suggested answer: A

Explanation:

Mitigate is the risk treatment option that has been applied by implementing a firewall in front of the legacy application because it helps to reduce the impact or probability of a risk. Mitigate is a process of taking actions to lessen the negative effects of a risk, such as implementing security controls, policies, or procedures. A firewall is a security device that monitors and filters the network traffic between the legacy application and the external network, blocking or allowing packets based on predefined rules. A firewall helps to mitigate the risk of unauthorized access, exploitation, or attack on the legacy application that cannot be patched. Therefore, mitigate is the correct answer.

https://simplicable.com/risk/risk-treatment

https://resources.infosecinstitute.com/topic/risk-treatment-options-planning-prevention/

https://www.enisa.europa.eu/topics/risk-management/current-risk/risk-management-inventory/rm-process/risk-treatment.

Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?

A.
Block IP addresses used by the attacker
A.
Block IP addresses used by the attacker
Answers
B.
Redirect the attacker's traffic
B.
Redirect the attacker's traffic
Answers
C.
Disable firewall ports exploited by the attacker.
C.
Disable firewall ports exploited by the attacker.
Answers
D.
Power off affected servers
D.
Power off affected servers
Answers
Suggested answer: B

Explanation:

Redirecting the attacker's traffic is a viable containment strategy for a distributed denial of service (DDoS) attack because it helps to divert the malicious traffic away from the target server and reduce the impact of the attack. A DDoS attack is an attempt by attackers to overwhelm a server or a network with a large volume of requests or packets, preventing legitimate users from accessing the service or resource. Redirecting the attacker's traffic is a technique that involves changing the DNS settings or routing tables to send the attacker's traffic to another destination, such as a sinkhole, a honeypot, or a scrubbing center. A sinkhole is a server that absorbs and discards the malicious traffic. A honeypot is a decoy server that mimics the target server and collects information about the attacker's behavior and techniques. A scrubbing center is a service that filters out the malicious traffic and forwards only the legitimate traffic to the target server. Redirecting the attacker's traffic helps to contain the DDoS attack by reducing the load on the target server and preserving its availability and performance. Therefore, redirecting the attacker's traffic is the correct answer.

https://www.fortinet.com/resources/cyberglossary/implement-ddos-mitigation-strategy

https://learn.microsoft.com/en-us/azure/ddos-protection/ddos-response-strategy

https://www.cloudflare.com/learning/ddos/glossary/sinkholing/.

Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?

A.
Review the key performance indicator (KPI) dashboard
A.
Review the key performance indicator (KPI) dashboard
Answers
B.
Review security-related key risk indicators (KRIs)
B.
Review security-related key risk indicators (KRIs)
Answers
C.
Review control self-assessment (CSA) results
C.
Review control self-assessment (CSA) results
Answers
D.
Review periodic security audits
D.
Review periodic security audits
Answers
Suggested answer: B

Explanation:

Security-related KRIs are metrics that measure the effectiveness of the information security profile in achieving the business objectives and managing the risks. Reviewing security-related KRIs can help to determine if the information security profile is aligned with business requirements, as they reflect the security performance and outcomes that are relevant for the business. Reviewing other options, such as KPIs, CSAs, or audits, may provide some insights into the security status, but they are not the best way to assess the alignment with business requirements, as they may not capture the business context and goals adequately.

Reference:

https://www.nist.gov/cyberframework/examples-framework-profiles

https://www.isaca.org/resources/isaca-journal/issues/2019/volume-5/accountability-for-information-security-roles-and-responsibilities-part-1

https://www.isaca.org/resources/isaca-journal/issues/2017/volume-4/enterprise-security-architecturea-top-down-approach

Which of the following is the GREATEST challenge with assessing emerging risk in an organization?

A.
Lack of a risk framework
A.
Lack of a risk framework
Answers
B.
Ineffective security controls
B.
Ineffective security controls
Answers
C.
Presence of known vulnerabilities
C.
Presence of known vulnerabilities
Answers
D.
Incomplete identification of threats
D.
Incomplete identification of threats
Answers
Suggested answer: D

Explanation:

The greatest challenge with assessing emerging risk in an organization is the incomplete identification of threats, as emerging risks are often new, unknown, or unfamiliar, and may not be fully understood or assessed. Incomplete identification of threats can lead to gaps in risk analysis and management, and expose the organization to unexpected or unprepared scenarios. The other options, such as lack of a risk framework, ineffective security controls, or presence of known vulnerabilities, are not specific to emerging risks, and may apply to any type of risk assessment.

Reference:

https://committee.iso.org/sites/tc262/home/projects/ongoing/iso-31022-guidelines-for-impl-2.html

https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2023/volume-6/emerging-risk-analysis

https://projectriskcoach.com/emerging-risks/

Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?

A.
Demonstrating the program's value to the organization
A.
Demonstrating the program's value to the organization
Answers
B.
Discussing governance programs found in similar organizations
B.
Discussing governance programs found in similar organizations
Answers
C.
Providing the results of external audits
C.
Providing the results of external audits
Answers
D.
Providing examples of information security incidents within the organization
D.
Providing examples of information security incidents within the organization
Answers
Suggested answer: A

Explanation:

The best way to obtain senior management support for an information security governance program is to demonstrate the program's value to the organization, such as how it can help achieve business objectives, reduce operational risks, enhance resilience, and comply with regulations. Demonstrating the value of information security governance can help senior management understand the benefits and costs of the program, and motivate them to participate in the decision-making process. The other options, such as discussing governance programs in similar organizations, providing external audit results, or providing examples of incidents, may not be sufficient or persuasive enough to obtain senior management support, as they may not reflect the specific needs and goals of the organization.

Reference:

https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2020/how-to-involve-senior-management-in-the-information-security-governance-process

https://www.sans.org/white-papers/992/

https://www.govtech.com/blogs/lohrmann-on-cybersecurity/how-to-get-management-support-for-your-security-program.html

An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?

A.
Allow the practice to continue temporarily for monitoring purposes.
A.
Allow the practice to continue temporarily for monitoring purposes.
Answers
B.
Disable the employees' remote access to company email and data
B.
Disable the employees' remote access to company email and data
Answers
C.
Initiate remote wipe of the devices
C.
Initiate remote wipe of the devices
Answers
D.
Assess the business need to provide a secure solution
D.
Assess the business need to provide a secure solution
Answers
Suggested answer: D

Explanation:

The most effective course of action when employees are using free cloud storage services to store company data through their mobile devices is to assess the business need to provide a secure solution, such as a corporate-approved cloud service or a virtual desktop environment. Assessing the business need can help understand why employees are using free cloud storage services, what kind of data they are storing, and what are the security risks and requirements. Based on the assessment, the security manager can propose a secure solution that meets the business needs and complies with the BYOD policy. The other options, such as allowing the practice to continue, disabling remote access, or initiating remote wipe, may not address the underlying business need or may cause disruption or data loss.

Reference:

https://www.digitalguardian.com/blog/byod-security-expert-tips-policy-mitigating-risks-preventing-breach

https://news.microsoft.com/en-xm/2021/03/18/how-to-have-secure-remote-working-with-a-byod-policy/

https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/-infosec-guide-bring-your-own-device-byod

An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:

A.
disable the user's access to corporate resources.
A.
disable the user's access to corporate resources.
Answers
B.
terminate the device connectivity.
B.
terminate the device connectivity.
Answers
C.
remotely wipe the device
C.
remotely wipe the device
Answers
D.
escalate to the user's management
D.
escalate to the user's management
Answers
Suggested answer: C

Explanation:

The best step to address the situation of losing a smartphone that contains sensitive information is to remotely wipe the device, which means erasing all the data on the device and restoring it to factory settings. Remotely wiping the device can prevent unauthorized access to the sensitive information and protect the organization from data breaches or leaks. Remotely wiping the device can be done through services such as Find My Device for Android or Find My iPhone for iOS, or through mobile device management (MDM) solutions. The other options, such as disabling the user's access, terminating the device connectivity, or escalating to the user's management, may not be effective or timely enough to secure the sensitive information on the device.

Reference:

https://www.security.org/resources/protect-data-lost-device/

https://support.google.com/android/answer/6160491?hl=en

https://www.pcmag.com/how-to/locate-lock-erase-how-to-find-lost-android-phone

Total 793 questions
Go to page: of 80