ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 51

Question list
Search
Search

List of questions

Search

What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?

A.
Vendor service level agreements (SLAs)
A.
Vendor service level agreements (SLAs)
Answers
B.
Independent review of the vendor
B.
Independent review of the vendor
Answers
C.
Local laws and regulations
C.
Local laws and regulations
Answers
D.
Backup and restoration of data
D.
Backup and restoration of data
Answers
Suggested answer: C

Explanation:

he greatest concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider is the local laws and regulations that may apply to the data and the cloud service provider. Local laws and regulations may vary significantly across different jurisdictions and may impose different requirements or restrictions on the data protection, privacy, security, sovereignty, retention, disclosure, transfer, or access. These laws and regulations may also create potential conflicts or inconsistencies with the organization's own policies, standards, or contractual obligations. Therefore, an information security manager should conduct a thorough legal and regulatory analysis before outsourcing data processing to a cloud service provider and ensure that the cloud service provider complies with all the applicable laws and regulations in the relevant jurisdictions.

Reference= CISM Manual1, Chapter 3: Information Security Program Development (ISPD), Section 3.1: Outsourcing2

1: https://store.isaca.org/s/store#/store/browse/cat/a2D4w00000Ac6NNEAZ/tiles2: 1

Outsourcing data processing to a cloud service provider may expose the organization to different legal and regulatory requirements depending on the location of the data and the vendor. This could affect the organization's compliance and liability in case of a breach or dispute. Therefore, the information security manager should be most concerned about the local laws and regulations that apply to the outsourcing arrangement.

Which of the following is the MOST important outcome of a post-incident review?

A.
The impact of the incident is reported to senior management.
A.
The impact of the incident is reported to senior management.
Answers
B.
The system affected by the incident is restored to its prior state.
B.
The system affected by the incident is restored to its prior state.
Answers
C.
The person responsible for the incident is identified.
C.
The person responsible for the incident is identified.
Answers
D.
The root cause of the incident is determined.
D.
The root cause of the incident is determined.
Answers
Suggested answer: D

Explanation:

Determining the root cause of the incident is essential for preventing or minimizing the recurrence of similar incidents, as well as for identifying and implementing corrective actions to improve the security posture of the organization.

Reference= CISM Review Manual 2022, page 3121; CISM Exam Content Outline, Domain 4, Task 4.3

When establishing metrics for an information security program, the BEST approach is to identify indicators that:

A.
reduce information security program spending.
A.
reduce information security program spending.
Answers
B.
support major information security initiatives.
B.
support major information security initiatives.
Answers
C.
reflect the corporate risk culture.
C.
reflect the corporate risk culture.
Answers
D.
demonstrate the effectiveness of the security program.
D.
demonstrate the effectiveness of the security program.
Answers
Suggested answer: D

Explanation:

Metrics for an information security program should be aligned with the security objectives and strategy, and should demonstrate how well the program is performing in terms of reducing risk, enhancing security posture, and supporting business goals. Metrics that support major information security initiatives, reflect the corporate risk culture, or reduce information security program spending may be useful, but they are not the best approach for establishing metrics for the entire program.

Reference= CISM Review Manual 2022, page 3171; CISM Exam Content Outline, Domain 4, Knowledge Statement 4.112

Which of the following is MOST important to the effectiveness of an information security program?

A.
Security metrics
A.
Security metrics
Answers
B.
Organizational culture
B.
Organizational culture
Answers
C.
IT governance
C.
IT governance
Answers
D.
Risk management
D.
Risk management
Answers
Suggested answer: D

Explanation:

Risk management is the most important factor for the effectiveness of an information security program, as it provides a systematic and consistent approach to identify, assess, treat, and monitor the information security risks that could affect the organization's objectives. Risk management also helps to align the security program with the business strategy, prioritize the security initiatives and resources, and communicate the value of security to the stakeholders.

Reference= CISM Review Manual 2022, page 3071; CISM Exam Content Outline, Domain 4, Knowledge Statement 4.1

Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?

A.
Disconnect the system from the network.
A.
Disconnect the system from the network.
Answers
B.
Change passwords on the compromised system.
B.
Change passwords on the compromised system.
Answers
C.
Restore the system from a known good backup.
C.
Restore the system from a known good backup.
Answers
D.
Perform operation system hardening.
D.
Perform operation system hardening.
Answers
Suggested answer: C

Explanation:

Restoring the system from a known good backup is the most appropriate eradication method when responding to an incident resulting in malware on an application server, as it ensures that the system is free of any malicious code and that the data and applications are consistent with the expected state. Disconnecting the system from the network may prevent further spread of the malware, but it does not eradicate it from the system. Changing passwords on the compromised system may reduce the risk of unauthorized access, but it does not remove the malware from the system. Performing operation system hardening may improve the security configuration of the system, but it does not guarantee that the malware is eliminated from the system.

Reference= CISM Review Manual 2022, page 3131; CISM Exam Content Outline, Domain 4, Task 4.4

Which of the following is MOST important to include in an information security strategy?

A.
Stakeholder requirements
A.
Stakeholder requirements
Answers
B.
Risk register
B.
Risk register
Answers
C.
Industry benchmarks
C.
Industry benchmarks
Answers
D.
Regulatory requirements
D.
Regulatory requirements
Answers
Suggested answer: A

Explanation:

Stakeholder requirements are the most important to include in an information security strategy, as they reflect the business needs, objectives, and expectations of the organization and its key stakeholders. Stakeholder requirements also help to align the information security strategy with the enterprise governance and the organizational culture. Risk register, industry benchmarks, and regulatory requirements are important inputs for the information security strategy, but they are not the most important to include.

Reference= CISM Review Manual 2022, page 321; CISM Exam Content Outline, Domain 1, Task 1.12

An organization uses a security standard that has undergone a major revision by the certifying authority. The old version of the standard will no longer be used for organizations wishing to maintain their certifications. Which of the following should be the FIRST

course of action?

A.
Evaluate the cost of maintaining the certification.
A.
Evaluate the cost of maintaining the certification.
Answers
B.
Review the new standard for applicability to the business.
B.
Review the new standard for applicability to the business.
Answers
C.
Modify policies to ensure new requirements are covered.
C.
Modify policies to ensure new requirements are covered.
Answers
D.
Communicate the new standard to senior leadership.
D.
Communicate the new standard to senior leadership.
Answers
Suggested answer: B

Explanation:

Reviewing the new standard for applicability to the business is the first course of action, as it helps to understand the changes, gaps, and impacts of the revision on the organization's security posture, compliance status, and business objectives. Evaluating the cost of maintaining the certification, modifying policies to ensure new requirements are covered, and communicating the new standard to senior leadership are important steps, but they should be done after reviewing the new standard for applicability to the business.

Reference= CISM Review Manual 2022, page 361; CISM Exam Content Outline, Domain 1, Task 1.2

Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?

A.
To improve awareness of information security
A.
To improve awareness of information security
Answers
B.
To disclose the root cause of the incident
B.
To disclose the root cause of the incident
Answers
C.
To increase goodwill toward the organization
C.
To increase goodwill toward the organization
Answers
D.
To comply with regulations regarding notification
D.
To comply with regulations regarding notification
Answers
Suggested answer: D

Explanation:

Complying with regulations regarding notification is the most important reason for an organization to communicate to affected parties that a security incident has occurred, as it helps to avoid legal penalties, fines, or sanctions that may result from failing to notify the relevant authorities, customers, or other stakeholders in a timely and appropriate manner. Additionally, complying with regulations regarding notification may also help to preserve the trust and reputation of the organization, as well as to facilitate the investigation and resolution of the incident.

Reference= CISM Review Manual 2022, page 3151; CISM Exam Content Outline, Domain 4, Task 4.5

Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of confidentiality?

A.
Ensuring hashing of administrator credentials
A.
Ensuring hashing of administrator credentials
Answers
B.
Enforcing service level agreements (SLAs)
B.
Enforcing service level agreements (SLAs)
Answers
C.
Ensuring encryption for data in transit
C.
Ensuring encryption for data in transit
Answers
D.
Utilizing a formal change management process
D.
Utilizing a formal change management process
Answers
Suggested answer: C

Explanation:

Ensuring encryption for data in transit is the best activity that supports the concept of confidentiality within the CIA triad, as it protects the data from unauthorized access or interception while it is being transmitted over a network. Encryption is a technique that transforms data into an unreadable form using a secret key, so that only authorized parties who have the key can decrypt and access the data. Encryption standards include AES (Advanced Encryption Standard) and DES (Data Encryption Standard).

Reference= CISM Review Manual 2022, page 321; CISM Exam Content Outline, Domain 1, Knowledge Statement 1.12; The CIA triad: Definition, components and examples3; CIA Triad - GeeksforGeeks4

Which of the following BEST enables an organization to operate smoothly with reduced capacities when service has been disrupted?

A.
Crisis management plan
A.
Crisis management plan
Answers
B.
Disaster recovery plan (DRP)
B.
Disaster recovery plan (DRP)
Answers
C.
Incident response plan
C.
Incident response plan
Answers
D.
Business continuity plan (BCP)
D.
Business continuity plan (BCP)
Answers
Suggested answer: D

Explanation:

A business continuity plan (BCP) is the best option that enables an organization to operate smoothly with reduced capacities when service has been disrupted, as it defines the processes and procedures to maintain or resume critical business functions and minimize the impact of the disruption on the organization's objectives, customers, and stakeholders. A BCP also includes strategies for resource management, communication, recovery, and testing.

Reference= CISM Review Manual 2022, page 3101; CISM Exam Content Outline, Domain 4, Knowledge Statement 4.82; CISM 2020: Business Continuity3; Part Two: Business Continuity and Disaster Recovery Plans4

Total 793 questions
Go to page: of 80