ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 49

Question list
Search
Search

Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?

A.
Establishing the root cause of the incident
A.
Establishing the root cause of the incident
Answers
B.
Identifying attack vectors utilized in the incident
B.
Identifying attack vectors utilized in the incident
Answers
C.
When business operations were restored after the incident
C.
When business operations were restored after the incident
Answers
D.
How incident management processes were executed
D.
How incident management processes were executed
Answers
Suggested answer: D

Explanation:

The primary focus of a lessons learned exercise following a successful response to a cybersecurity incident is to evaluate how the incident management processes were executed, and to identify the strengths, weaknesses, best practices, and improvement opportunities for future incidents. A lessons learned exercise is not meant to determine the root cause, the attack vectors, or the recovery time of the incident, but rather to assess the performance and effectiveness of the incident response team and the incident response plan.

Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?

A.
Report the risk associated with the policy breach.
A.
Report the risk associated with the policy breach.
Answers
B.
Enforce the security configuration and require the change to be reverted.
B.
Enforce the security configuration and require the change to be reverted.
Answers
C.
Implement compensating controls to address the risk.
C.
Implement compensating controls to address the risk.
Answers
D.
Implement a privileged access management system.
D.
Implement a privileged access management system.
Answers
Suggested answer: B

Explanation:

The first thing that an information security manager should do upon confirming a privileged user's unauthorized modifications to a security application is to enforce the security configuration and require the change to be reverted. This is because the unauthorized modification may have compromised the security of the application and the data it protects, and may have violated the security policies and standards of the organization. By enforcing the security configuration and requiring the change to be reverted, the information security manager can restore the security posture of the application and prevent further unauthorized modifications.

Which of the following is the MOST important outcome of effective risk treatment?

A.
Elimination of risk
A.
Elimination of risk
Answers
B.
Timely reporting of incidents
B.
Timely reporting of incidents
Answers
C.
Reduced cost of acquiring controls
C.
Reduced cost of acquiring controls
Answers
D.
Implementation of corrective actions
D.
Implementation of corrective actions
Answers
Suggested answer: D

Explanation:

The most important outcome of effective risk treatment is the implementation of corrective actions that address the root causes of the risk and reduce its likelihood and/or impact to an acceptable level. Effective risk treatment does not necessarily eliminate the risk, but rather brings it within the organization's risk appetite and tolerance. Timely reporting of incidents and reduced cost of acquiring controls are desirable benefits of effective risk treatment, but they are not the primary outcome.

Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?

A.
A security information and event management (SIEM) system
A.
A security information and event management (SIEM) system
Answers
B.
An intrusion prevention system (IPS)
B.
An intrusion prevention system (IPS)
Answers
C.
A virtual private network (VPN) with multi-factor authentication (MFA)
C.
A virtual private network (VPN) with multi-factor authentication (MFA)
Answers
D.
An identity and access management (IAM) system
D.
An identity and access management (IAM) system
Answers
Suggested answer: A

Explanation:

A SIEM system is the best tool for providing an incident response team with the greatest insight into insider threat activity across multiple systems because it can collect, correlate, analyze, and report on security events and logs from various sources, such as network devices, servers, applications, and user activities. A SIEM system can also detect and alert on anomalous or suspicious behaviors, such as unauthorized access, data exfiltration, privilege escalation, or policy violations, that may indicate an insider threat. A SIEM system can also support forensic investigations and incident response actions by providing a centralized and comprehensive view of the security posture and incidents.

Which of the following would BEST mitigate accidental data loss events?

A.
Conduct periodic user awareness training.
A.
Conduct periodic user awareness training.
Answers
B.
Obtain senior management support for the information security strategy.
B.
Obtain senior management support for the information security strategy.
Answers
C.
Conduct a data loss prevention (DLP) audit.
C.
Conduct a data loss prevention (DLP) audit.
Answers
D.
Enforce a data hard drive encryption policy.
D.
Enforce a data hard drive encryption policy.
Answers
Suggested answer: A

Explanation:

Conducting periodic user awareness training is the best way to mitigate accidental data loss events because it can educate the users on the causes, consequences, and prevention of data loss, and increase their awareness of the security policies and procedures of the organization. User awareness training can also help users to identify and report potential data loss incidents, and to adopt good practices such as backing up data, encrypting data, and using secure channels for data transmission and storage.

Which of the following is the PRIMARY reason to assign a risk owner in an organization?

A.
To remediate residual risk
A.
To remediate residual risk
Answers
B.
To define responsibilities
B.
To define responsibilities
Answers
C.
To ensure accountability
C.
To ensure accountability
Answers
D.
To identify emerging risk
D.
To identify emerging risk
Answers
Suggested answer: C

Explanation:

The primary reason to assign a risk owner in an organization is to ensure accountability for the risk and its treatment. A risk owner is a person or entity that has the authority and responsibility to manage a specific risk and to implement the appropriate risk response actions. By assigning a risk owner, the organization can ensure that the risk is monitored, reported, and controlled in accordance with the organization's risk appetite and tolerance.

Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?

A.
Impact of service interruption
A.
Impact of service interruption
Answers
B.
Results of recovery testing
B.
Results of recovery testing
Answers
C.
Determination of recovery point objective (RPO)
C.
Determination of recovery point objective (RPO)
Answers
D.
Direction from senior management
D.
Direction from senior management
Answers
Suggested answer: A

Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?

A.
Manage business process changes.
A.
Manage business process changes.
Answers
B.
Update business impact analyses (BIAs) on a regular basis.
B.
Update business impact analyses (BIAs) on a regular basis.
Answers
C.
Conduct periodic testing.
C.
Conduct periodic testing.
Answers
D.
Review and update emergency contact lists.
D.
Review and update emergency contact lists.
Answers
Suggested answer: C

Explanation:

Conducting periodic testing is the best way to ensure the BCP is current because it can validate the effectiveness and efficiency of the BCP, identify any gaps or weaknesses, and provide feedback and recommendations for improvement. Testing can also verify that the BCP reflects the current business environment, processes, and requirements, and that the BCP team members are familiar with their roles and responsibilities.

An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?

A.
Perform a business impact analysis (BIA).
A.
Perform a business impact analysis (BIA).
Answers
B.
Notify local law enforcement agencies of a breach.
B.
Notify local law enforcement agencies of a breach.
Answers
C.
Activate the incident response program.
C.
Activate the incident response program.
Answers
D.
Validate the risk to the organization.
D.
Validate the risk to the organization.
Answers
Suggested answer: D

Explanation:

The first thing that the information security manager should do after reading about a vendor product compromise on social media is to validate the risk to the organization. This means verifying the source and credibility of the information, determining if the organization uses the affected product, and assessing the potential impact and likelihood of the compromise on the organization's data and systems. Validating the risk to the organization will help the information security manager to decide on the appropriate course of action, such as activating the incident response program, notifying relevant stakeholders, or performing a BIA.

When integrating security risk management into an organization it is MOST important to ensure:

A.
business units approve the risk management methodology.
A.
business units approve the risk management methodology.
Answers
B.
the risk treatment process is defined.
B.
the risk treatment process is defined.
Answers
C.
information security policies are documented and understood.
C.
information security policies are documented and understood.
Answers
D.
the risk management methodology follows an established framework.
D.
the risk management methodology follows an established framework.
Answers
Suggested answer: A

Explanation:

When integrating security risk management into an organization, it is most important to ensure that the risk management methodology follows an established framework, such as ISO 31000, NIST SP 800-30, or COBIT. This is because a framework provides a consistent and structured approach to identify, assess, treat, and monitor risks, and to align the risk management process with the organization's objectives, culture, and governance. A framework also helps to ensure compliance with relevant standards and regulations, and to facilitate communication and reporting of risks to stakeholders.

Total 793 questions
Go to page: of 80