ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 43

Question list
Search
Search

To improve the efficiency of the development of a new software application, security requirements should be defined:

A.
based on code review.
A.
based on code review.
Answers
B.
based on available security assessment tools.
B.
based on available security assessment tools.
Answers
C.
after functional requirements.
C.
after functional requirements.
Answers
D.
concurrently with other requirements.
D.
concurrently with other requirements.
Answers
Suggested answer: D

Explanation:

Security requirements should be defined concurrently with other requirements to ensure that security is built into the software development process from the beginning and not added as an afterthought. This will also improve the efficiency of the development process by reducing the need for rework and testing.Security requirements should be based on the business objectives, risk assessment, and security policies of the organization, not on code review, security assessment tools, or functional requirements.Reference= CISM Review Manual 15th Edition, page 1241; CISM Item Development Guide, page 62

An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:

A.
organizational alignment
A.
organizational alignment
Answers
B.
IT strategy alignment
B.
IT strategy alignment
Answers
C.
threats to the organization
C.
threats to the organization
Answers
D.
existing control costs
D.
existing control costs
Answers
Suggested answer: A

Explanation:

A new security project is more likely to be approved if it aligns with the organization's goals, objectives, and strategies. This shows that the project supports the business needs and adds value to the organization.Organizational alignment is one of the key elements of a business case for information security, as stated in the CISM Review Manual, 16th Edition1, page 41.IT strategy alignment, threats to the organization, and existing control costs are also important factors to consider, but they are not as persuasive as organizational alignment in obtaining approval for a new security project.Reference=1: CISM Review Manual, 16th Edition by Isaca (Author)

Learn more:

1. isaca.org2. amazon.com3. gov.uk

Which of the following is the PRIMARY role of the information security manager in application development?

A.
To ensure security is integrated into the system development life cycle (SDLC)
A.
To ensure security is integrated into the system development life cycle (SDLC)
Answers
B.
To ensure compliance with industry best practice
B.
To ensure compliance with industry best practice
Answers
C.
To ensure enterprise security controls are implemented
C.
To ensure enterprise security controls are implemented
Answers
D.
To ensure control procedures address business risk
D.
To ensure control procedures address business risk
Answers
Suggested answer: A

Explanation:

According to the CISM Review Manual, one of the primary roles of the information security manager in application development is to ensure that security is integrated into the SDLC. This means that security requirements, design, testing, deployment, and maintenance are all considered and addressed throughout the application development process.By doing so, the information security manager can help to prevent or mitigate security risks, ensure compliance with standards and regulations, and improve the quality and reliability of the application1

The other options are not as accurate as ensuring security is integrated into the SDLC. Ensuring compliance with industry best practices is a secondary role of the information security manager in application development, as it involves following established guidelines and frameworks for secure application development. However, compliance alone does not guarantee that security is actually implemented in the application. Ensuring enterprise security controls are implemented is a tertiary role of the information security manager in application development, as it involves applying existing policies and procedures for managing and monitoring security activities across the organization. However, enterprise controls alone do not ensure that security is tailored to the specific needs and context of each application. Ensuring control procedures address business risk is a quaternary role of the information security manager in application development, as it involves identifying and assessing potential threats and vulnerabilities that could affect the business objectives and operations of each application.However, business risk alone does not ensure that security measures are aligned with the value proposition and benefits of each application1

Reference=1: CISM Review Manual, 16th Edition, ISACA, 2020, pp. 30-31...

Which of the following should be an information security manager s MOST important consideration when determining the priority for implementing security controls?

A.
Alignment with industry benchmarks
A.
Alignment with industry benchmarks
Answers
B.
Results of business impact analyses (BIAs)
B.
Results of business impact analyses (BIAs)
Answers
C.
Possibility of reputational loss due to incidents
C.
Possibility of reputational loss due to incidents
Answers
D.
Availability of security budget
D.
Availability of security budget
Answers
Suggested answer: B

Explanation:

The priority for implementing security controls should be based on the results of BIAs, which identify the criticality and recovery requirements of business processes and the supporting information assets. BIAs help to align security controls with business needs and objectives, and to optimize the allocation of security resources.Alignment with industry benchmarks, possibility of reputational loss due to incidents, and availability of security budget are important factors, but they are not the most important consideration for determining the priority for implementing security controls.Reference= CISM Review Manual, 16th Edition, page 971; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 2672

Which of the following BEST minimizes information security risk in deploying applications to the production environment?

A.
Integrating security controls in each phase of the life cycle
A.
Integrating security controls in each phase of the life cycle
Answers
B.
Conducting penetration testing post implementation
B.
Conducting penetration testing post implementation
Answers
C.
Having a well-defined change process
C.
Having a well-defined change process
Answers
D.
Verifying security during the testing process
D.
Verifying security during the testing process
Answers
Suggested answer: A

Explanation:

= Integrating security controls in each phase of the life cycle is the best way to minimize information security risk in deploying applications to the production environment. This ensures that security requirements are defined, designed, implemented, tested, and maintained throughout the development process. Conducting penetration testing post implementation, having a well-defined change process, and verifying security during the testing process are all important activities, but they are not sufficient to address all the potential risks that may arise during the application life cycle. Penetration testing may reveal some vulnerabilities, but it cannot guarantee that all of them are identified and fixed. A change process may help to control and document the modifications made to the application, but it does not ensure that the changes are secure and do not introduce new risks.Verifying security during the testing process may help to validate the functionality and performance of the security controls, but it does not ensure that the security requirements are complete and consistent with the business objectives and the risk appetite of the organization.Reference= CISM Review Manual, 16th Edition, page 1121; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 1462

Which of the following is the BEST way to determine the effectiveness of an incident response plan?

A.
Reviewing previous audit reports
A.
Reviewing previous audit reports
Answers
B.
Conducting a tabletop exercise
B.
Conducting a tabletop exercise
Answers
C.
Benchmarking the plan against best practices
C.
Benchmarking the plan against best practices
Answers
D.
Performing a penetration test
D.
Performing a penetration test
Answers
Suggested answer: B

Explanation:

A tabletop exercise is a simulation of a potential incident scenario that involves the key stakeholders and tests the roles, responsibilities, and procedures of the incident response plan. It is the best way to determine the effectiveness of the plan because it allows the participants to identify and address any gaps, weaknesses, or ambiguities in the plan, as well as to evaluate the communication, coordination, and decision-making processes. A tabletop exercise can also help to raise awareness, enhance skills, and improve teamwork among the incident response team members and other relevant parties.

The PRIMARY goal to a post-incident review should be to:

A.
identify policy changes to prevent a recurrence.
A.
identify policy changes to prevent a recurrence.
Answers
B.
determine how to improve the incident handling process.
B.
determine how to improve the incident handling process.
Answers
C.
establish the cost of the incident to the business.
C.
establish the cost of the incident to the business.
Answers
D.
determine why the incident occurred.
D.
determine why the incident occurred.
Answers
Suggested answer: B

Explanation:

The primary goal of a post-incident review is to identify areas for improvement in the incident handling process. The focus is on evaluating the effectiveness of incident response procedures, technical controls, communication channels, coordination among teams, documentation, and any other relevant aspects.The post-incident review should also provide recommendations for corrective actions, preventive measures, and lessons learned that can help reduce the likelihood and impact of future incidents12.Reference= CISM Review Manual 15th Edition, page 1251; CISM Item Development Guide, page 72

A security incident has been reported within an organization When should an information security manager contact the information owner?

A.
After the incident has been mitigated
A.
After the incident has been mitigated
Answers
B.
After the incident has been confirmed.
B.
After the incident has been confirmed.
Answers
C.
After the potential incident has been togged
C.
After the potential incident has been togged
Answers
D.
After the incident has been contained
D.
After the incident has been contained
Answers
Suggested answer: B

Explanation:

= An information security manager should contact the information owner after the incident has been confirmed, as this is the point when the impact and severity of the incident can be assessed and communicated. The information owner is responsible for the business value and use of the information and should be involved in the decision making process regarding the incident response. Contacting the information owner after the incident has been mitigated or contained may be too late, as the information owner may have different priorities or expectations than the security team.Contacting the information owner after the potential incident has been logged may be premature, as the incident may turn out to be a false positive or a minor issue that does not require the information owner's attention.Reference=1: CISM Review Manual, 16th Edition by Isaca (Author), page 292.

Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?

A.
Force password changes on the SQL database.
A.
Force password changes on the SQL database.
Answers
B.
Reconfigure the web application firewall to block the attack.
B.
Reconfigure the web application firewall to block the attack.
Answers
C.
Update the detection patterns on the web application firewall.
C.
Update the detection patterns on the web application firewall.
Answers
D.
Block the IPs from where the attack originates.
D.
Block the IPs from where the attack originates.
Answers
Suggested answer: B

Explanation:

According to the CISM Review Manual, one of the best ways to contain an SQL injection attack that has been detected by a web application firewall is to reconfigure the web application firewall to block the attack. This means that the web application firewall should be updated with the latest detection patterns and rules that can identify and prevent SQL injection attacks.By doing so, the web application firewall can reduce the impact and damage of the attack, and prevent further exploitation of the vulnerable database1

The other options are not as effective as reconfiguring the web application firewall to block the attack. Force password changes on the SQL database is a reactive measure that does not address the root cause of the problem, and may cause data loss or corruption if not done properly. Updating the detection patterns on the web application firewall is a preventive measure that can help to detect SQL injection attacks, but it does not stop them from happening in the first place.Blocking IPs from where the attack originates is a defensive measure that can limit or stop some SQL injection attacks, but it does not protect all possible sources of malicious traffic, and may also affect legitimate users or applications1

Reference=1: CISM Review Manual, 16th Edition, ISACA, 2020, pp. 32-33...

Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?

A.
Revise the procurement process.
A.
Revise the procurement process.
Answers
B.
Update the change management process.
B.
Update the change management process.
Answers
C.
Discuss the issue with senior leadership.
C.
Discuss the issue with senior leadership.
Answers
D.
Remove the application from production.
D.
Remove the application from production.
Answers
Suggested answer: C

Explanation:

An information security manager should first discuss the issue with senior leadership to escalate the problem and seek their support and guidance. Bypassing the change management process can introduce significant risks to the organization, such as unauthorized access, data loss, system instability, or compliance violations. The information security manager should explain the potential impact and consequences of the incident, and recommend corrective actions to remediate the situation. The information security manager should also review the root cause of the incident and identify any gaps or weaknesses in the existing policies, procedures, or controls that allowed the business unit to implement the new application without proper authorization, testing, or documentation. The information security manager should then revise the procurement process, update the change management process, or implement other measures to prevent similar incidents from occurring in the future.Removing the application from production may not be feasible or desirable, depending on the business needs and the severity of the risks involved.References= CISM Review Manual, 16th Edition, pages 100-1011; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 2692

Learn more:

1. isaca.org2. amazon.com3. gov.uk

Total 793 questions
Go to page: of 80