ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 42

Question list
Search
Search

List of questions

Search

Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?

A.
Suspend the data exchange with the provider
A.
Suspend the data exchange with the provider
Answers
B.
Notify appropriate regulatory authorities of the breach.
B.
Notify appropriate regulatory authorities of the breach.
Answers
C.
Initiate the business continuity plan (BCP)
C.
Initiate the business continuity plan (BCP)
Answers
D.
Validate the breach with the provider
D.
Validate the breach with the provider
Answers
Suggested answer: D

Explanation:

The first thing an information security manager should do after learning through mass media of a data breach at the organization's hosted payroll service provider is to validate the breach with the provider, which means contacting the provider directly and confirming the details and scope of the breach, such as when it occurred, what data was compromised, and what actions the provider is taking to mitigate the impact. Validating the breach with the provider can help the information security manager assess the situation accurately and plan the next steps accordingly. The other options, such as suspending the data exchange, notifying regulatory authorities, or initiating the business continuity plan, may be premature or unnecessary before validating the breach with the provider.

Reference:

https://www.wired.com/story/sequoia-hr-data-breach/

https://cybernews.com/news/kronos-major-hr-and-payroll-service-provider-hit-with-ransomware-warns-of-a-long-outage/

https://www.afr.com/work-and-careers/workplace/pay-in-crisis-as-major-payroll-company-hacked-20211117-p599mr

Which of the following MUST be established to maintain an effective information security governance framework?

A.
Security controls automation
A.
Security controls automation
Answers
B.
Defined security metrics
B.
Defined security metrics
Answers
C.
Change management processes
C.
Change management processes
Answers
D.
Security policy provisions
D.
Security policy provisions
Answers
Suggested answer: D

Explanation:

Security policy provisions are the statements or rules that define the information security objectives, principles, roles and responsibilities, and requirements for the organization. Security policy provisions must be established to maintain an effective information security governance framework, as they provide the foundation and direction for the information security activities and processes within the organization. Security policy provisions also help to align the information security governance framework with the business strategy and objectives, and ensure compliance with relevant laws and regulations. The other options, such as security controls automation, defined security metrics, or change management processes, are important components of an information security governance framework, but they are not essential to establish it.

Reference:

https://www.iso.org/standard/74046.html

https://www.nistf.gov/cyberframework

https://www.iso.org/standard/27001

An incident response team has established that an application has been breached. Which of the following should be done NEXT?

A.
Maintain the affected systems in a forensically acceptable state
A.
Maintain the affected systems in a forensically acceptable state
Answers
B.
Conduct a risk assessment on the affected application
B.
Conduct a risk assessment on the affected application
Answers
C.
Inform senior management of the breach.
C.
Inform senior management of the breach.
Answers
D.
Isolate the impacted systems from the rest of the network
D.
Isolate the impacted systems from the rest of the network
Answers
Suggested answer: D

Explanation:

The next thing an incident response team should do after establishing that an application has been breached is to isolate the impacted systems from the rest of the network, which means disconnecting them from the internet or other network connections to prevent further spread of the attack or data exfiltration. Isolating the impacted systems can help to contain the breach and limit its impact on the organization. The other options, such as maintaining the affected systems in a forensically acceptable state, conducting a risk assessment, or informing senior management, may be done later in the incident response process, after isolating the impacted systems.

Reference:

https://www.crowdstrike.com/cybersecurity-101/incident-response/

https://learn.microsoft.com/en-us/security/operations/incident-response-playbooks

https://www.invicti.com/blog/web-security/incident-response-steps-web-application-security/

An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?

A.
Lack of availability
A.
Lack of availability
Answers
B.
Lack of accountability
B.
Lack of accountability
Answers
C.
Improper authorization
C.
Improper authorization
Answers
D.
Inadequate authentication
D.
Inadequate authentication
Answers
Suggested answer: B

Explanation:

The greatest concern with the situation of privileged employee access requests to production servers being approved but not logged is the lack of accountability, which means the inability to trace or verify the actions and decisions of the privileged users. Lack of accountability can lead to security risks such as unauthorized changes, data breaches, fraud, or misuse of privileges. Logging user actions is a key component of privileged access management (PAM), which helps to monitor, detect, and prevent unauthorized privileged access to critical resources. The other options, such as lack of availability, improper authorization, or inadequate authentication, are not directly related to the situation of not logging user actions.

Reference:

https://www.microsoft.com/en-us/security/business/security-101/what-is-privileged-access-management-pam

https://www.ekransystem.com/en/blog/privileged-user-monitoring-best-practices

https://www.beyondtrust.com/resources/glossary/privileged-access-management-pam

When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?

A.
Managing the impact
A.
Managing the impact
Answers
B.
Identifying unacceptable risk levels
B.
Identifying unacceptable risk levels
Answers
C.
Assessing vulnerabilities
C.
Assessing vulnerabilities
Answers
D.
Evaluating potential threats
D.
Evaluating potential threats
Answers
Suggested answer: A

Explanation:

When preventive controls to appropriately mitigate risk are not feasible, the most important action for the information security manager is to manage the impact, which means taking measures to reduce the likelihood or severity of the consequences of the risk. Managing the impact can involve using alternative controls, such as engineering, administrative, or personal protective controls, that can lower the exposure or harm to the organization. The other options, such as identifying unacceptable risk levels, assessing vulnerabilities, or evaluating potential threats, are part of the risk assessment process, but they are not actions to mitigate risk when preventive controls are not feasible.

Reference:

https://bcmmetrics.com/risk-mitigation-evaluating-your-controls/

https://www.osha.gov/safety-management/hazard-prevention

https://www.cdc.gov/niosh/topics/hierarchy/default.html

When assigning a risk owner, the MOST important consideration is to ensure the owner has:

A.
adequate knowledge of risk treatment and related control activities.
A.
adequate knowledge of risk treatment and related control activities.
Answers
B.
decision-making authority and the ability to allocate resources for risk.
B.
decision-making authority and the ability to allocate resources for risk.
Answers
C.
sufficient time for monitoring and managing the risk effectively.
C.
sufficient time for monitoring and managing the risk effectively.
Answers
D.
risk communication and reporting skills to enable decision-making.
D.
risk communication and reporting skills to enable decision-making.
Answers
Suggested answer: B

Explanation:

Comprehensive and Detailed Explanation = The risk owner is the person or entity with the accountability and authority to manage a risk. The risk owner should have the decision-making authority and the ability to allocate resources for risk treatment and related control activities. The risk owner should also be responsible for monitoring and reporting on the risk, but these are not the most important considerations when assigning a risk owner. The risk owner may not have adequate knowledge of risk treatment and related control activities, but can delegate or consult with experts as needed. The risk owner should also have sufficient time for managing the risk effectively, but this is not a prerequisite for assigning a risk owner.

Reference =

CISM Review Manual 15th Edition, page 76

CISM Practice Quiz, question 4171

The MOST useful technique for maintaining management support for the information security program is:

A.
informing management about the security of business operations.
A.
informing management about the security of business operations.
Answers
B.
implementing a comprehensive security awareness and training program.
B.
implementing a comprehensive security awareness and training program.
Answers
C.
identifying the risks and consequences of failure to comply with standards.
C.
identifying the risks and consequences of failure to comply with standards.
Answers
D.
benchmarking the security programs of comparable organizations.
D.
benchmarking the security programs of comparable organizations.
Answers
Suggested answer: C

Explanation:

= According to the CISM Review Manual, one of the key success factors for an information security program is to maintain management support and commitment. This can be achieved by providing regular reports to management on the security status of the organization, the effectiveness of the security controls, and the alignment of the security program with the business objectives and strategy. By informing management about the security of business operations, the information security manager can demonstrate the value and benefits of the security program, and ensure that management is aware of the security risks and issues that need to be addressed.This technique can also help to build trust and confidence between the information security manager and the senior management, and foster a culture of security within the organization1

The other options are not as effective as informing management about the security of business operations. Implementing a comprehensive security awareness and training program is important, but it is mainly targeted at the end users and staff, not the senior management. Identifying the risks and consequences of failure to comply with standards can help to justify the need for security controls, but it can also create a negative impression of the security program as being too restrictive or punitive.Benchmarking the security programs of comparable organizations can provide some insights and best practices, but it may not reflect the specific needs and context of the organization, and it may not be relevant or applicable to the management's expectations and priorities1

Reference=1: CISM Review Manual, 16th Edition, ISACA, 2020, pp. 28-29...

Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?

A.
Risk heat map.
A.
Risk heat map.
Answers
B.
Security benchmark report.
B.
Security benchmark report.
Answers
C.
Security metrics dashboard.
C.
Security metrics dashboard.
Answers
D.
Key risk indicators (KRIs).
D.
Key risk indicators (KRIs).
Answers
Suggested answer: C

Explanation:

A security metrics dashboard is a graphical representation of key performance indicators (KPIs) and key risk indicators (KRIs) that provide useful information about the effectiveness of the information security program. A security metrics dashboard can help communicate the value and performance of the information security program to senior management and other stakeholders, as well as identify areas for improvement and alignment with business objectives. A security metrics dashboard should be concise, relevant, timely, accurate, and actionable.

Reference= CISM Review Manual 16th Edition, page 163; CISM Review Questions, Answers & Explanations Manual 9th Edition, page 419.

After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?

A.
The service level agreement (SLA) was not met.
A.
The service level agreement (SLA) was not met.
Answers
B.
The recovery time objective (RTO) was not met.
B.
The recovery time objective (RTO) was not met.
Answers
C.
The root cause was not identified.
C.
The root cause was not identified.
Answers
D.
Notification to stakeholders was delayed.
D.
Notification to stakeholders was delayed.
Answers
Suggested answer: C

Explanation:

= After a ransomware incident, the most important concern for the information security manager is to identify the root cause of the incident and prevent it from happening again. The root cause analysis (RCA) is a systematic process of finding and eliminating the underlying factors that led to the incident, such as vulnerabilities, misconfigurations, human errors, or malicious actions. Without performing a RCA, the organization may not be able to address the root cause and may face the same or similar incidents in the future, which could result in more damage, costs, and reputational loss. Therefore, the information security manager should prioritize the RCA over other concerns, such as meeting the SLA, RTO, or notification requirements, which are important but secondary to the RCA.

Reference= CISM Review Manual 15th Edition, page 254-2551; CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, QID 4202

Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?

A.
Impact on compliance risk.
A.
Impact on compliance risk.
Answers
B.
Inability to determine short-term impact.
B.
Inability to determine short-term impact.
Answers
C.
Impact on the risk culture.
C.
Impact on the risk culture.
Answers
D.
Deviation from risk management best practices
D.
Deviation from risk management best practices
Answers
Suggested answer: C

Explanation:

Comprehensive and Detailed Explanation = The impact on the risk culture is the greatest concern for the information security manager, because it reflects the attitude and behavior of the organization towards risk management. If management accepts an operational risk that compromises a critical monitoring process, it may indicate a lack of awareness, commitment, or accountability for risk management. This may erode the trust and confidence of the stakeholders, regulators, and customers, and expose the organization to further risks. The impact on compliance risk, the inability to determine short-term impact, and the deviation from risk management best practices are also important, but they are secondary to the impact on the risk culture.

Reference = CISM Review Manual 15th Edition, page 48. CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, question ID 421.

Total 793 questions
Go to page: of 80