ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 50

Question list
Search
Search

What is the PRIMARY objective of implementing standard security configurations?

A.
Maintain a flexible approach to mitigate potential risk to unsupported systems.
A.
Maintain a flexible approach to mitigate potential risk to unsupported systems.
Answers
B.
Minimize the operational burden of managing and monitoring unsupported systems.
B.
Minimize the operational burden of managing and monitoring unsupported systems.
Answers
C.
Control vulnerabilities and reduce threats from changed configurations.
C.
Control vulnerabilities and reduce threats from changed configurations.
Answers
D.
Compare configurations between supported and unsupported systems.
D.
Compare configurations between supported and unsupported systems.
Answers
Suggested answer: C

Explanation:

The primary objective of implementing standard security configurations is to control vulnerabilities and reduce threats from changed configurations. Standard security configurations are the baseline settings and parameters that define the desired security level and functionality of information systems and devices. By implementing standard security configurations, the organization can ensure that the information systems and devices are configured in a consistent and secure manner, and that any deviations or changes from the standard are detected and corrected. This can help to prevent or mitigate potential security incidents caused by misconfigurations, unauthorized modifications, or malicious attacks.

An organization has identified a large volume of old data that appears to be unused. Which of the following should the information security manager do NEXT?

A.
Consult the record retention policy.
A.
Consult the record retention policy.
Answers
B.
Update the awareness and training program.
B.
Update the awareness and training program.
Answers
C.
Implement media sanitization procedures.
C.
Implement media sanitization procedures.
Answers
D.
Consult the backup and recovery policy.
D.
Consult the backup and recovery policy.
Answers
Suggested answer: A

Explanation:

The next thing that the information security manager should do after identifying a large volume of old data that appears to be unused is to consult the record retention policy. The record retention policy is a document that defines the types, formats, and retention periods of data that the organization needs to keep for legal, regulatory, operational, or historical purposes. By consulting the record retention policy, the information security manager can determine if the old data is still required to be stored, archived, or disposed of, and how to do so in a secure and compliant manner.

When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:

A.
expected duration of outage.
A.
expected duration of outage.
Answers
B.
management direction.
B.
management direction.
Answers
C.
type of security incident.
C.
type of security incident.
Answers
D.
the root cause of the event.
D.
the root cause of the event.
Answers
Suggested answer: A

Explanation:

The expected duration of outage is the primary factor that should trigger the BCP because it indicates how long the organization can tolerate the disruption of its critical business processes and functions before it causes unacceptable consequences. The expected duration of outage is determined by the recovery time objectives (RTOs) that are defined for each critical business process and function based on the business impact analysis (BIA). The BCP should be triggered when the expected duration of outage exceeds or is likely to exceed the RTOs.

Which of the following BEST indicates the effectiveness of the vendor risk management process?

A.
Increase in the percentage of vendors certified to a globally recognized security standard
A.
Increase in the percentage of vendors certified to a globally recognized security standard
Answers
B.
Increase in the percentage of vendors with a completed due diligence review
B.
Increase in the percentage of vendors with a completed due diligence review
Answers
C.
Increase in the percentage of vendors conducting mandatory security training
C.
Increase in the percentage of vendors conducting mandatory security training
Answers
D.
Increase in the percentage of vendors that have reported security breaches
D.
Increase in the percentage of vendors that have reported security breaches
Answers
Suggested answer: A

Explanation:

This answer best indicates the effectiveness of the vendor risk management process because it shows that the organization has established and enforced clear and consistent security requirements and expectations for its vendors, and that the vendors have demonstrated their compliance and commitment to security best practices. A globally recognized security standard, such as ISO 27001, NIST CSF, or COBIT, provides a comprehensive and objective framework for assessing and improving the security posture and performance of vendors.

Which type of recovery site is MOST reliable and can support stringent recovery requirements?

A.
Cold site
A.
Cold site
Answers
B.
Warm site
B.
Warm site
Answers
C.
Hot site
C.
Hot site
Answers
D.
Mobile site
D.
Mobile site
Answers
Suggested answer: C

Explanation:

A hot site is the most reliable type of recovery site and can support stringent recovery requirements because it is a fully operational facility that mirrors the primary production center. A hot site has all the hardware, software, data, network, and personnel ready to resume the critical business functions within minutes of a disruptive event. A hot site also has backup power, security, and communication systems to ensure the continuity of operations.

To effectively manage an organization's information security risk, it is MOST important to:

A.
assign risk management responsibility to an experienced consultant.
A.
assign risk management responsibility to an experienced consultant.
Answers
B.
periodically identify and correct new systems vulnerabilities.
B.
periodically identify and correct new systems vulnerabilities.
Answers
C.
establish and communicate risk tolerance.
C.
establish and communicate risk tolerance.
Answers
D.
benchmark risk scenarios against peer organizations.
D.
benchmark risk scenarios against peer organizations.
Answers
Suggested answer: C

Explanation:

To effectively manage an organization's information security risk, it is most important to establish and communicate risk tolerance, which is the level of risk that the organization is willing to accept or bear. By establishing and communicating risk tolerance, the organization can align its risk management strategy and objectives with its business goals and values, and ensure that the risk management activities and decisions are consistent and appropriate across the organization.

In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?

A.
Maturity of the security policy
A.
Maturity of the security policy
Answers
B.
Clarity of security roles and responsibilities
B.
Clarity of security roles and responsibilities
Answers
C.
Corporate culture
C.
Corporate culture
Answers
D.
Corporate risk framework
D.
Corporate risk framework
Answers
Suggested answer: C

Explanation:

Corporate culture is the most important factor to consider when trying to gain organization-wide support for an information security program because it reflects the values, beliefs, and behaviors of the organization and its members. Corporate culture influences how the organization perceives, prioritizes, and responds to information security risks and issues, and how it adopts and implements information security policies and practices. By understanding and aligning with the corporate culture, the information security manager can communicate the benefits and value of the information security program, and foster a positive and collaborative security culture across the organization.

Which of the following provides the MOST useful information for identifying security control gaps on an application server?

A.
Risk assessments
A.
Risk assessments
Answers
B.
Threat models
B.
Threat models
Answers
C.
Penetration testing
C.
Penetration testing
Answers
D.
Internal audit reports
D.
Internal audit reports
Answers
Suggested answer: C

Explanation:

Penetration testing is the most useful method for identifying security control gaps on an application server because it simulates real-world attacks and exploits the vulnerabilities and weaknesses of the application server. Penetration testing can reveal the actual impact and risk of the security control gaps, and provide recommendations for remediation and improvement.

Which of the following would be MOST helpful when creating information security policies?

A.
The information security framework
A.
The information security framework
Answers
B.
Business impact analysis (BIA)
B.
Business impact analysis (BIA)
Answers
C.
Information security metrics
C.
Information security metrics
Answers
D.
Risk assessment results
D.
Risk assessment results
Answers
Suggested answer: A

Explanation:

The information security framework is a set of principles, standards, guidelines, and best practices that define the scope, objectives, and requirements for information security in an organization. The information security framework is most helpful when creating information security policies because it provides a consistent and coherent approach to managing information security risks, aligning with business goals and strategy, and complying with relevant laws and regulations. The information security framework also helps to establish the roles, responsibilities, and accountability of all stakeholders involved in information security governance, management, and operations.

Reference= CISM Manual1, Chapter 3: Information Security Program Development (ISPD), Section 3.1: Information Security Framework2

1: https://store.isaca.org/s/store#/store/browse/cat/a2D4w00000Ac6NNEAZ/tiles2:1

Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?

A.
Legal
A.
Legal
Answers
B.
Information security
B.
Information security
Answers
C.
Help desk
C.
Help desk
Answers
D.
Human resources (HR)
D.
Human resources (HR)
Answers
Suggested answer: B

Explanation:

Information security is the most critical function when initiating the removal of system access for terminated employees, as it is responsible for ensuring that the access rights of the employees are revoked in a timely and effective manner, and that the security of the organization's data and systems is maintained. Information security should coordinate with other functions, such as HR, legal, and help desk, to implement the access removal process, but it is the primary function that has the authority and capability to disable or delete the access credentials of the terminated employees. The other options are not as critical as information security, as they may have different roles or responsibilities in the access removal process, or they may not have direct access to the systems or tools that control the access rights of the employees.Reference=

CISM Review Manual 15th Edition, page 114: ''Information security is responsible for ensuring that access rights are revoked in a timely and effective manner.''

SOC 2 Controls: Access Removal for Terminated or Transferred Users, snippets: ''Systems access that is no longer required for terminated or transferred users is removed within one business day. For terminated employees, access to key IT systems is revoked in a timely manner. A termination checklist and ticket are completed, and access is revoked for employees as a component of the employee termination process.''

IT Involvement in Employee Termination, A Checklist, snippets: ''Disable all network access. If your company uses a master access list of active passwords, tell the system to deny any passcodes associated with the user being terminated. If your system doesn't have a deny function, delete the user and their associated passwords. Monitor employee access.''

Human resources (HR) is the most critical function when initiating the removal of system access for terminated employees because it is responsible for notifying the relevant parties, such as information security, help desk, and legal, of the employee's termination status and date. HR also ensures that the employee's exit process is completed and documented, and that the employee returns any company-owned devices or assets. HR also coordinates with the employee's manager and team to ensure a smooth transition of work and responsibilities.

Total 793 questions
Go to page: of 80