ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 45

Question list
Search
Search

Who is accountable for approving an information security governance framework?

A.
The board of directors
A.
The board of directors
Answers
B.
The chief information security officer (ClSO)
B.
The chief information security officer (ClSO)
Answers
C.
The enterprise risk committee
C.
The enterprise risk committee
Answers
D.
The chief information officer (CIO)
D.
The chief information officer (CIO)
Answers
Suggested answer: A

Explanation:

The board of directors is ultimately responsible for the governance of the organization, including the approval of the information security governance framework and the oversight of its implementation and performance.Reference= CISM Review Manual, 16th Edition, Domain 1: Information Security Governance, Chapter 2: Establish and Maintain an Information Security Governance Framework, Section: Roles and Responsibilities of Senior Management and the Board of Directors1

Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?

A.
Protection of business value and assets
A.
Protection of business value and assets
Answers
B.
Identification of core business strategies C, Easier entrance into new businesses and technologies
B.
Identification of core business strategies C, Easier entrance into new businesses and technologies
Answers
C.
Improved regulatory compliance posture
C.
Improved regulatory compliance posture
Answers
Suggested answer: A

Explanation:

Information security governance is the process of establishing and maintaining a framework to provide assurance that information security strategies are aligned with and support business objectives, are consistent with applicable laws and regulations, and are effectively managed. By aligning information security governance with corporate governance, the organization can ensure that information security is integrated into the business processes and decision making, and that the information security risks and opportunities are properly identified, assessed, and addressed.Reference= CISM Review Manual, 16th Edition, Chapter 1, Section 1.1

The GREATEST challenge when attempting data recovery of a specific file during forensic analysis is when:

A.
the partition table on the disk has been deleted.
A.
the partition table on the disk has been deleted.
Answers
B.
the tile has been overwritten.
B.
the tile has been overwritten.
Answers
C.
all files in the directory have been deleted.
C.
all files in the directory have been deleted.
Answers
D.
high-level disk formatting has been performed.
D.
high-level disk formatting has been performed.
Answers
Suggested answer: B

Explanation:

Data recovery is the process of restoring data that has been lost, corrupted, or deleted. When a file is deleted, it is usually not physically erased from the disk, but only marked as free space by the operating system. Therefore, it may be possible to recover the file by using specialized tools that scan the disk for the file's data. However, if the file has been overwritten by another file or data, then the original file's data is lost and cannot be recovered. The other options are not as challenging as overwriting, because they only affect the logical structure of the disk, not the physical data. For example, the partition table, the directory, and the formatting information can be reconstructed or bypassed by using forensic tools.Reference= CISM Review Manual, 16th Edition, Chapter 5, Section 5.4.1.2

An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?

A.
Guidelines
A.
Guidelines
Answers
B.
Policies
B.
Policies
Answers
C.
Procedures
C.
Procedures
Answers
D.
Standards
D.
Standards
Answers
Suggested answer: D

Explanation:

Standards are detailed statements of the minimum requirements for hardware, software, or security configurations. They are used to define the minimum security controls required for user workstations.Reference= CISM Review Manual, 16th Edition, page 69.

Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?

A.
Network address translation (NAT)
A.
Network address translation (NAT)
Answers
B.
Message hashing
B.
Message hashing
Answers
C.
Transport Layer Security (TLS)
C.
Transport Layer Security (TLS)
Answers
D.
Multi-factor authentication
D.
Multi-factor authentication
Answers
Suggested answer: C

Explanation:

Transport Layer Security (TLS) is a protocol that provides encryption, authentication, and integrity for data transmitted over the Internet. TLS protects the confidentiality of data by encrypting it before sending it and decrypting it after receiving it.TLS also verifies the identity of the communicating parties by using certificates and prevents data tampering by using message authentication codes.Reference= CISM Review Manual, 16th Edition, Chapter 4, Section 4.3.2.11

Which of the following is the FIRST step when conducting a post-incident review?

A.
Identify mitigating controls.
A.
Identify mitigating controls.
Answers
B.
Assess the costs of the incident.
B.
Assess the costs of the incident.
Answers
C.
Perform root cause analysis.
C.
Perform root cause analysis.
Answers
D.
Assign responsibility for corrective actions.
D.
Assign responsibility for corrective actions.
Answers
Suggested answer: C

Explanation:

A post-incident review is a process of analyzing an incident and its impact, identifying the root causes, and recommending corrective actions to prevent recurrence. The first step of a post-incident review is to perform root cause analysis, which is the process of identifying the underlying factors that contributed to the occurrence and severity of the incident.Root cause analysis helps to determine the most effective and efficient solutions to address the problem and avoid future incidents.Reference= CISM Review Manual, 16th Edition, Chapter 5, Section 5.5.2.11

Which of the following BEST facilitates the effectiveness of cybersecurity incident response?

A.
Utilizing a security information and event management (SIEM) tool.
A.
Utilizing a security information and event management (SIEM) tool.
Answers
B.
Utilizing industry-leading network penetration testing tools.
B.
Utilizing industry-leading network penetration testing tools.
Answers
C.
Increasing communication with all incident response stakeholders.
C.
Increasing communication with all incident response stakeholders.
Answers
D.
Continuously updating signatures of the anti-malware solution.
D.
Continuously updating signatures of the anti-malware solution.
Answers
Suggested answer: C

Explanation:

Communication is a key factor for the effectiveness of cybersecurity incident response, as it ensures that all relevant parties are informed, coordinated, and aligned on the incident status, impact, actions, and responsibilities.Communication also helps to maintain trust, confidence, and transparency among the stakeholders, such as senior management, business units, customers, regulators, law enforcement, and media.Reference= CISM Review Manual, 16th Edition, Chapter 5, Section 5.4.2.11

Which of the following is the MOST important constraint to be considered when developing an information security strategy?

A.
Legal and regulatory requirements
A.
Legal and regulatory requirements
Answers
B.
Established security policies and standards
B.
Established security policies and standards
Answers
C.
Compliance with an international security standard
C.
Compliance with an international security standard
Answers
D.
Information security architecture
D.
Information security architecture
Answers
Suggested answer: A

Explanation:

Legal and regulatory requirements are the most important constraint to be considered when developing an information security strategy, as they define the minimum level of security that the organization must comply with to avoid legal sanctions, fines, or reputational damage.Legal and regulatory requirements may vary depending on the jurisdiction, industry, and type of data that the organization handles, and they may impose specific security controls, standards, or frameworks that the organization must follow.Reference= CISM Review Manual, 16th Edition, Chapter 1, Section 1.2.1.11

An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?

A.
Escalate to the chief risk officer (CRO).
A.
Escalate to the chief risk officer (CRO).
Answers
B.
Conduct a vulnerability analysis.
B.
Conduct a vulnerability analysis.
Answers
C.
Conduct a risk analysis.
C.
Conduct a risk analysis.
Answers
D.
Determine compensating controls.
D.
Determine compensating controls.
Answers
Suggested answer: C

Explanation:

A risk analysis is the next step to identify and evaluate the potential security risks associated with a third-party service provider and determine the appropriate risk response strategies.Reference= CISM Review Manual, 16th Edition, Domain 2: Information Risk Management, Chapter 2: Risk Identification, p.97-981; Chapter 3: Risk Assessment, p.109-1101; Chapter 4: Risk Response, p.123-1241

What is the role of the information security manager in finalizing contract negotiations with service providers?

A.
To perform a risk analysis on the outsourcing process
A.
To perform a risk analysis on the outsourcing process
Answers
B.
To obtain a security standard certification from the provider
B.
To obtain a security standard certification from the provider
Answers
C.
To update security standards for the outsourced process
C.
To update security standards for the outsourced process
Answers
D.
To ensure that clauses for periodic audits are included
D.
To ensure that clauses for periodic audits are included
Answers
Suggested answer: A

Explanation:

The role of the information security manager in finalizing contract negotiations with service providers is to ensure that the outsourcing process is aligned with the organization's information security policies, standards, and objectives. One of the key aspects of this process is to perform a risk analysis on the outsourcing process, which involves identifying, assessing, and mitigating the potential threats and vulnerabilities that may arise from outsourcing activities. A risk analysis can help the information security manager to determine the appropriate level of security controls and requirements for the outsourced process, as well as to monitor and evaluate its performance and compliance.A risk analysis can also help to avoid or minimize legal, financial, reputational, or operational risks associated with outsourcing1.Reference=

CISM Review Manual (Digital Version), Chapter 6: Information Security Program Management

CISM Review Manual (Print Version), Chapter 6: Information Security Program Management

Total 793 questions
Go to page: of 80