ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 48

Question list
Search
Search

Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?

A.
Define policies and standards for data processing.
A.
Define policies and standards for data processing.
Answers
B.
Implement applicable privacy principles
B.
Implement applicable privacy principles
Answers
C.
Assess local or regional regulations
C.
Assess local or regional regulations
Answers
D.
Research cyber insurance policies
D.
Research cyber insurance policies
Answers
Suggested answer: C

Explanation:

Before transferring personal data across borders, an organization should first assess the local or regional regulations that apply to the data protection and privacy of the data subjects. This will help the organization to identify the legal requirements and risks involved in the data transfer, and to choose the appropriate tools and safeguards to ensure compliance and protection. For example, the organization may need to obtain consent from the data subjects, use adequacy decisions, standard contractual clauses, or other mechanisms to ensure an adequate level of protection in the third country, or rely on specific derogations for certain situations. The other options are not the first steps to take, although they may be relevant at later stages of the data transfer process.Reference=

Guide to the cross-border transfer of personal data in the GDPR

New guidance issued by the EDPB on international transfers of personal data

Requirements for transferring personal information across borders

During which of the following development phases is it MOST challenging to implement security controls?

A.
Post-implementation phase
A.
Post-implementation phase
Answers
B.
Implementation phase
B.
Implementation phase
Answers
C.
Development phase
C.
Development phase
Answers
D.
Design phase
D.
Design phase
Answers
Suggested answer: C

Explanation:

The development phase is the stage of the system development life cycle (SDLC) where the system requirements, design, architecture, and implementation are performed. The development phase is most challenging to implement security controls because it involves complex and dynamic processes that may not be well understood or documented. Security controls are essential for ensuring the confidentiality, integrity, and availability of the system and its data, as well as for complying with regulatory and contractual obligations. However, security controls may also introduce additional costs, risks, and constraints to the development process, such as:

Increased complexity and overhead of testing, verification, validation, and maintenance

Reduced flexibility and agility of changing requirements or design

Increased dependency on external vendors or third parties for security services or products

Increased vulnerability to errors, defects, or vulnerabilities in the code or configuration

Increased difficulty in measuring and reporting on security performance or effectiveness

Therefore, implementing security controls in the development phase requires careful planning, coordination, communication, and collaboration among all stakeholders involved in the SDLC. It also requires a clear understanding of the security objectives, scope, criteria, standards, policies, procedures, roles, responsibilities, and resources for the system. Moreover, it requires a proactive approach to identifying and mitigating potential threats or risks that may affect the security of the system.

Reference= CISM Manual1, Chapter 3: Information Security Program Development (ISPD), Section 3.1: System Development Life Cycle (SDLC)2

1: https://store.isaca.org/s/store#/store/browse/cat/a2D4w00000Ac6NNEAZ/tiles2: https://store.isaca.org/s/store#/store/browse/cat/a2D4w00000Ac6NNEAZ/tiles

Which of the following is the MOST important consideration when briefing executives about the current state of the information security program?

A.
Including a situational forecast
A.
Including a situational forecast
Answers
B.
Using appropriate language for the target audience
B.
Using appropriate language for the target audience
Answers
C.
Including trend charts for metrics
C.
Including trend charts for metrics
Answers
D.
Using a rating system to demonstrate program effectiveness
D.
Using a rating system to demonstrate program effectiveness
Answers
Suggested answer: B

Explanation:

= When briefing executives about the current state of the information security program, the most important consideration is to use appropriate language for the target audience. This means avoiding technical jargon, acronyms, and details that may confuse or bore the executives, and instead focusing on the business value, risks, and benefits of the information security program. The other options are not as important or relevant as using appropriate language, although they may also be useful to include in the briefing. For example, a situational forecast may be helpful to show the future trends and challenges, but it is not as essential as communicating the current state clearly and concisely. Similarly, trend charts for metrics and a rating system to demonstrate program effectiveness may be useful to support the briefing, but they are not as critical as using language that the executives can understand and relate to.Reference=

Information Security Guide for Government Executives, page 7: ''Reminding employees of their responsibilities and demonstrating management's commitment to the security program are key to maintaining effective security within the constantly changing information security environment.''

Information security guide for government executives - NIST, page 3: ''The executive should communicate the importance of information security to the organization and its staff, using language that is meaningful to the target audience.''

Information Security Committee Charter - SecurityStudio, page 1: ''The committee also coordinates and communicates the direction, current state, and oversight of the information security program.''

Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:

A.
a function of the likelihood and impact, should a threat exploit a vulnerability.
A.
a function of the likelihood and impact, should a threat exploit a vulnerability.
Answers
B.
the magnitude of the impact, should a threat exploit a vulnerability.
B.
the magnitude of the impact, should a threat exploit a vulnerability.
Answers
C.
a function of the cost and effectiveness of controls over a vulnerability.
C.
a function of the cost and effectiveness of controls over a vulnerability.
Answers
D.
the likelihood of a given threat attempting to exploit a vulnerability
D.
the likelihood of a given threat attempting to exploit a vulnerability
Answers
Suggested answer: A

Explanation:

= According to the CISM Manual1, risk is defined as the combination of the probability of an event and its consequence. Therefore, determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as a function of the likelihood and impact, should a threat exploit a vulnerability. Likelihood is the probability or frequency of a threat occurring, while impact is the magnitude or severity of the harm or loss that would result from a threat exploiting a vulnerability. The higher the likelihood and impact, the higher the risk. The lower the likelihood and impact, the lower the risk.

The other options are not correct because they do not capture the full expression of risk. Option B only considers the impact, but not the likelihood, of a threat exploiting a vulnerability. Option C confuses the risk with the risk response, which is the action taken to reduce or mitigate the risk. Option D only considers the likelihood, but not the impact, of a threat attempting to exploit a vulnerability.

Reference= CISM Manual1, Chapter 2: Information Risk Management (IRM), Section 2.1: Risk Concepts2

1: https://store.isaca.org/s/store#/store/browse/cat/a2D4w00000Ac6NNEAZ/tiles2:2

Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?

A.
Risk assessment results
A.
Risk assessment results
Answers
B.
Audit findings
B.
Audit findings
Answers
C.
Key risk indicators (KRIs)
C.
Key risk indicators (KRIs)
Answers
D.
Baseline controls
D.
Baseline controls
Answers
Suggested answer: D

Explanation:

Baseline controls are the minimum set of security requirements that apply to all information systems in an organization, regardless of their specific functions or characteristics. They are derived from the organization's security policies, standards, and best practices, and they reflect the organization's risk appetite and tolerance. Baseline controls provide a consistent and comprehensive foundation for the security of the information systems, and they can be tailored or supplemented by additional controls as needed for specific systems or situations. The other options are not as comprehensive as baseline controls, as they may only address certain aspects or aspects of the security requirements, or they may vary depending on the system or the context. For example, risk assessment results are an important input for defining the security requirements, but they are not the requirements themselves. Audit findings are an output of evaluating the compliance and effectiveness of the security requirements, but they are not the requirements themselves. Key risk indicators (KRIs) are metrics that measure the level of risk exposure and performance of the security requirements, but they are not the requirements themselves.Reference=

CISM Review Manual 15th Edition, page 113: ''Baseline controls are the minimum security requirements that apply to all systems within the organization.''

CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, question 478: ''Baseline controls are the minimum security requirements that apply to all systems within the organization. They are derived from the organization's security policies, standards, and best practices, and they reflect the organization's risk appetite and tolerance.''

Which of the following is ESSENTIAL to ensuring effective incident response?

A.
Business continuity plan (BCP)
A.
Business continuity plan (BCP)
Answers
B.
Cost-benefit analysis
B.
Cost-benefit analysis
Answers
C.
Classification scheme
C.
Classification scheme
Answers
D.
Senior management support
D.
Senior management support
Answers
Suggested answer: D

Explanation:

Senior management support is essential to ensuring effective incident response because it provides the necessary authority, resources, and guidance for the information security team to perform their roles and responsibilities. Senior management support also helps to establish the goals, scope, policies, and procedures for the incident response plan (IRP), as well as to ensure its alignment with the business objectives and strategy. Senior management support also fosters a culture of security awareness, accountability, and collaboration among all stakeholders involved in the incident response process.

The other options are not essential to ensuring effective incident response, although they may be helpful or beneficial. A business continuity plan (BCP) is a document that outlines the actions and arrangements to ensure the continuity of critical business functions in the event of a disruption or disaster. A cost-benefit analysis is a method of comparing the costs and benefits of different alternatives or solutions to a problem. A classification scheme is a system of categorizing information assets based on their sensitivity, value, and criticality.

Reference= CISM Manual1, Chapter 6: Incident Response Planning (IRP), Section 6.1: Incident Response Plan2

1: https://store.isaca.org/s/store#/store/browse/cat/a2D4w00000Ac6NNEAZ/tiles2:4

Which of the following is the BEST approach for data owners to use when defining access privileges for users?

A.
Define access privileges based on user roles.
A.
Define access privileges based on user roles.
Answers
B.
Adopt user account settings recommended by the vendor.
B.
Adopt user account settings recommended by the vendor.
Answers
C.
Perform a risk assessment of the users' access privileges.
C.
Perform a risk assessment of the users' access privileges.
Answers
D.
Implement an identity and access management (IDM) tool.
D.
Implement an identity and access management (IDM) tool.
Answers
Suggested answer: A

Explanation:

This approach is the best because it ensures that users have the minimum level of access required to perform their job functions, which reduces the risk of unauthorized access or misuse of data. User roles are defined based on the business needs and responsibilities of the users, and they can be easily managed and audited.

answer : ''Defining access privileges based on user roles is the best approach because it allows the data owner to assign the minimum level of access required for each role and to review and update the roles periodically'' (p. 23).

Following an employee security awareness training program, what should be the expected outcome?

A.
A decrease in the number of viruses detected in incoming emails
A.
A decrease in the number of viruses detected in incoming emails
Answers
B.
A decrease in reported social engineering attacks
B.
A decrease in reported social engineering attacks
Answers
C.
An increase in reported social engineering attempts
C.
An increase in reported social engineering attempts
Answers
D.
An increase in user-reported false positive incidents
D.
An increase in user-reported false positive incidents
Answers
Suggested answer: C

Explanation:

This outcome indicates that the employees are more aware of the signs and techniques of social engineering and are able to report them to the appropriate authorities. This also helps to prevent successful attacks and reduce the impact of potential breaches.

An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?

A.
Standards
A.
Standards
Answers
B.
Policies
B.
Policies
Answers
C.
Guidelines
C.
Guidelines
Answers
D.
Procedures
D.
Procedures
Answers
Suggested answer: D

Explanation:

Procedures are the detailed steps or instructions for performing specific tasks or activities. They are usually aligned with standards, policies and guidelines, but they are more specific and prescriptive. System maintenance instructions and schedules are examples of procedures that should be documented and followed to ensure the proper functioning and security of the system.

Which of the following is the BEST way to enhance training for incident response teams?

A.
Perform post-incident reviews.
A.
Perform post-incident reviews.
Answers
B.
Establish incident key performance indicators (KPIs).
B.
Establish incident key performance indicators (KPIs).
Answers
C.
Conduct interviews with organizational units.
C.
Conduct interviews with organizational units.
Answers
D.
Participate in emergency response activities.
D.
Participate in emergency response activities.
Answers
Suggested answer: A

Explanation:

Performing post-incident reviews is the best way to enhance training for incident response teams because it allows them to identify the strengths and weaknesses of their response, learn from the lessons and best practices, and implement corrective actions and improvement plans for future incidents. Post-incident reviews also help to evaluate the effectiveness and efficiency of the incident response process and procedures, and to update them as needed.

Total 793 questions
Go to page: of 80