ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 52

Question list
Search
Search

Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?

A.
Place the web server in quarantine.
A.
Place the web server in quarantine.
Answers
B.
Rebuild the server from the last verified backup.
B.
Rebuild the server from the last verified backup.
Answers
C.
Shut down the server in an organized manner.
C.
Shut down the server in an organized manner.
Answers
D.
Rebuild the server with relevant patches from the original media.
D.
Rebuild the server with relevant patches from the original media.
Answers
Suggested answer: B

Explanation:

= After a breach where the risk has been isolated and forensic processes have been performed, the next step should be to rebuild the server from the last verified backup. This will ensure that the server is restored to a known and secure state, and that any malicious code or data that may have been injected or compromised by the attacker is removed. Rebuilding the server from the original media may not be sufficient, as it may not include the latest patches or configurations that were applied before the breach. Placing the web server in quarantine or shutting it down may not be feasible or desirable, as it may disrupt the business operations or services that depend on the server. Rebuilding the server from the last verified backup is the best option to resume normal operations while maintaining security.Reference=

CISM Review Manual 15th Edition, page 118: ''Recovery is the process of restoring normal operations after an incident. Recovery activities may include rebuilding systems, restoring data, applying patches, changing passwords, and testing functionality.''

Data Breach Experts Share The Most Important Next Step You Should Take After A Data Breach in 2014 & 2015, snippet: ''Restore from backup. If you have a backup of your system from before the breach, wipe your system clean and restore from backup. This will ensure that any backdoors or malware installed by the hackers are removed.''

Which of the following should be done FIRST once a cybersecurity attack has been confirmed?

A.
Isolate the affected system.
A.
Isolate the affected system.
Answers
B.
Notify senior management.
B.
Notify senior management.
Answers
C.
Power down the system.
C.
Power down the system.
Answers
D.
Contact legal authorities.
D.
Contact legal authorities.
Answers
Suggested answer: A

Explanation:

Isolating the affected system is the first step in the incident response process, as it helps to contain the attack, prevent further damage, and preserve the evidence for analysis. Isolating the system can be done by disconnecting it from the network, blocking the malicious traffic, or applying quarantine rules.

Reference= CISM Review Manual 2022, page 3121; CISM Exam Content Outline, Domain 4, Task 4.22; Cybersecurity Incident Response Exercise Guidance3

An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:

A.
determine the security exposures.
A.
determine the security exposures.
Answers
B.
assess the ability to integrate the security department operations.
B.
assess the ability to integrate the security department operations.
Answers
C.
ensure compliance with international standards.
C.
ensure compliance with international standards.
Answers
D.
evaluate the security policy and standards.
D.
evaluate the security policy and standards.
Answers
Suggested answer: A

Explanation:

Information security due diligence is the process of assessing the current state of information security in an organization, identifying any gaps, risks, or vulnerabilities, and estimating the costs and efforts required to remediate them. Performing information security due diligence prior to making the purchase is important to determine the security exposures that may affect the value, reputation, or liability of the organization, as well as the feasibility and compatibility of integrating the security systems and processes of the two organizations.

Reference= CISM Review Manual 2022, page 361; CISM Exam Content Outline, Domain 1, Task 1.22; Information Security Due Diligence Questionnair

Which of the following BEST demonstrates that an anti-phishing campaign is effective?

A.
Improved staff attendance in awareness sessions
A.
Improved staff attendance in awareness sessions
Answers
B.
Decreased number of phishing emails received
B.
Decreased number of phishing emails received
Answers
C.
Improved feedback on the anti-phishing campaign
C.
Improved feedback on the anti-phishing campaign
Answers
D.
Decreased number of incidents that have occurred
D.
Decreased number of incidents that have occurred
Answers
Suggested answer: D

Explanation:

The ultimate goal of an anti-phishing campaign is to reduce the risk and impact of phishing attacks on the organization. Therefore, the most relevant and reliable indicator of the effectiveness of an anti-phishing campaign is the decreased number of incidents that have occurred as a result of phishing. This metric shows how well the employees have learned to recognize and report phishing emails, and how well the security controls have prevented or mitigated the damage caused by phishing.

Reference=Five Ways to Achieve a Successful Anti-Phishing Campaign;Don't click: towards an effective anti-phishing training. A comparative literature review;CISA, NSA, FBI, MS-ISAC Publish Guide on Preventing Phishing Intrusions

An organization that conducts business globally is planning to utilize a third-party service provider to process payroll information. Which of the following issues poses the GREATEST risk to the organization?

A.
The third party does not have an independent assessment of controls available for review.
A.
The third party does not have an independent assessment of controls available for review.
Answers
B.
The third party has not provided evidence of compliance with local regulations where data is generated.
B.
The third party has not provided evidence of compliance with local regulations where data is generated.
Answers
C.
The third-party contract does not include an indemnity clause for compensation in the event of a breach.
C.
The third-party contract does not include an indemnity clause for compensation in the event of a breach.
Answers
D.
The third party's service level agreement (SLA) does not include guarantees of uptime.
D.
The third party's service level agreement (SLA) does not include guarantees of uptime.
Answers
Suggested answer: B

Explanation:

The third party's lack of compliance with local regulations poses the greatest risk to the organization, as it may expose the organization to legal, regulatory, or reputational consequences, such as fines, sanctions, lawsuits, or loss of customer trust. Payroll information is considered sensitive personal data that may be subject to different privacy and security laws depending on the jurisdiction where it is generated, processed, or stored. Therefore, the organization should ensure that the third party adheres to the applicable regulations and standards, and obtains the necessary certifications or attestations to demonstrate compliance.

Reference= CISM Review Manual 2022, page 361; CISM Exam Content Outline, Domain 1, Task 1.22;Ensuring Vendor Compliance and Third-Party Risk Mitigation;How to Manage Access Risk Regarding Third-Party Service Providers

Capacity planning would prevent:

A.
file system overload arising from distributed denial of service (DDoS) attacks.
A.
file system overload arising from distributed denial of service (DDoS) attacks.
Answers
B.
system downtime for scheduled security maintenance.
B.
system downtime for scheduled security maintenance.
Answers
C.
application failures arising from insufficient hardware resources.
C.
application failures arising from insufficient hardware resources.
Answers
D.
software failures arising from exploitation of buffer capacity vulnerabilities.
D.
software failures arising from exploitation of buffer capacity vulnerabilities.
Answers
Suggested answer: C

Explanation:

Capacity planning is the process of estimating and allocating the required resources (such as CPU, memory, disk space, bandwidth, etc.) to meet the current and future demands of the information systems and applications. Capacity planning would prevent application failures arising from insufficient hardware resources, as it would ensure that the applications have enough resources to function properly and efficiently, and avoid performance degradation, errors, or crashes.

Reference= CISM Review Manual 2022, page 3081; CISM Exam Content Outline, Domain 4, Knowledge Statement 4.92;What is Capacity Planning? Definition and Examples

Which of the following is the BEST indication of a mature information security program?

A.
Security incidents are managed properly.
A.
Security incidents are managed properly.
Answers
B.
Security spending is below budget.
B.
Security spending is below budget.
Answers
C.
Security resources are optimized.
C.
Security resources are optimized.
Answers
D.
Security audit findings are reduced.
D.
Security audit findings are reduced.
Answers
Suggested answer: C

Explanation:

A mature information security program is one that is aligned with the business strategy, objectives, and culture, and that delivers value to the organization by effectively managing the information security risks and enhancing the security posture. Optimizing the security resources means that the program uses the available human, financial, and technical resources in the most efficient and effective way, and that it continuously monitors and improves the performance and maturity of the security processes and controls.

Reference= CISM Review Manual 2022, page 331; CISM Exam Content Outline, Domain 1, Knowledge Statement 1.22;What is a Mature Information Security Program?;How to Measure the Maturity of Your Cybersecurity Program

Which of the following is the PRIMARY benefit of implementing an information security governance framework?

A.
The framework defines managerial responsibilities for risk impacts to business goals.
A.
The framework defines managerial responsibilities for risk impacts to business goals.
Answers
B.
The framework provides direction to meet business goals while balancing risks and controls.
B.
The framework provides direction to meet business goals while balancing risks and controls.
Answers
C.
The framework provides a roadmap to maximize revenue through the secure use of technology.
C.
The framework provides a roadmap to maximize revenue through the secure use of technology.
Answers
D.
The framework is able to confirm the validity of business goals and strategies.
D.
The framework is able to confirm the validity of business goals and strategies.
Answers
Suggested answer: B

Explanation:

An information security governance framework is a set of principles, policies, standards, and processes that guide the development, implementation, and management of an effective information security program that supports the organization's objectives and strategy. The framework provides direction to meet business goals while balancing risks and controls, as it helps to align the information security activities with the business needs, priorities, and risk appetite, and to ensure that the security resources and investments are optimized and justified.

Reference= CISM Review Manual 2022, page 321; CISM Exam Content Outline, Domain 1, Knowledge Statement 1.22; CISM domain 1: Information security governanceUpdated 2022

Which of the following is MOST important for guiding the development and management of a comprehensive information security program?

A.
Adopting information security program management best practices
A.
Adopting information security program management best practices
Answers
B.
Implementing policies and procedures to address the information security strategy
B.
Implementing policies and procedures to address the information security strategy
Answers
C.
Aligning the organization's business objectives with IT objectives
C.
Aligning the organization's business objectives with IT objectives
Answers
D.
Establishing and maintaining an information security governance framework
D.
Establishing and maintaining an information security governance framework
Answers
Suggested answer: D

Explanation:

An information security governance framework is a set of principles, policies, standards, and processes that guide the development, implementation, and management of an effective information security program that supports the organization's objectives and strategy. The framework provides direction to meet business goals while balancing risks and controls, as it helps to align the information security activities with the business needs, priorities, and risk appetite, and to ensure that the security resources and investments are optimized and justified.

Reference= CISM Review Manual 2022, page 321; CISM Exam Content Outline, Domain 1, Knowledge Statement 1.22; CISM domain 1: Information security governanceUpdated 2022

The information security manager of a multinational organization has been asked to consolidate the information security policies of its regional locations. Which of the following would be of

GREATEST concern?

A.
Varying threat environments
A.
Varying threat environments
Answers
B.
Disparate reporting lines
B.
Disparate reporting lines
Answers
C.
Conflicting legal requirements
C.
Conflicting legal requirements
Answers
D.
Differences in work culture
D.
Differences in work culture
Answers
Suggested answer: C

Explanation:

Conflicting legal requirements would be of greatest concern when consolidating the information security policies of regional locations, as they may pose significant challenges and risks for the organization's compliance, privacy, and data protection obligations. Different jurisdictions may have different laws and regulations regarding information security, such as the General Data Protection Regulation (GDPR) in the European Union, the Health Insurance Portability and Accountability Act (HIPAA) in the United States, or the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada. These laws and regulations may have different definitions, scopes, standards, and enforcement mechanisms for information security, which may create conflicts or inconsistencies when applying a unified policy across the organization. Therefore, the information security manager should conduct a thorough analysis of the legal requirements of each location, and ensure that the consolidated policy meets the highest level of compliance and avoids any violations or penalties.

Reference= CISM Review Manual 2022, page 361; CISM Exam Content Outline, Domain 1, Task 1.22;CISM 2020: IT Security Policies;Information Security Due Diligence Questionnaire

Total 793 questions
Go to page: of 80