ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 53

Question list
Search
Search

List of questions

Search

Which of the following should be the FIRST step in patch management procedures when receiving an emergency security patch?

A.
Schedule patching based on the criticality.
A.
Schedule patching based on the criticality.
Answers
B.
Install the patch immediately to eliminate the vulnerability.
B.
Install the patch immediately to eliminate the vulnerability.
Answers
C.
Conduct comprehensive testing of the patch.
C.
Conduct comprehensive testing of the patch.
Answers
D.
Validate the authenticity of the patch.
D.
Validate the authenticity of the patch.
Answers
Suggested answer: D

Explanation:

Validating the authenticity of the patch is the first step in patch management procedures when receiving an emergency security patch, as it helps to ensure that the patch is genuine and not malicious. Validating the authenticity of the patch can be done by verifying the source, signature, checksum, or certificate of the patch, and comparing it with the information provided by the software vendor or manufacturer. Installing an unverified patch may introduce malware, compromise the system, or cause unexpected errors or conflicts.

Reference= CISM Review Manual 2022, page 3131; CISM Exam Content Outline, Domain 4, Task 4.42; Practical Patch Management and Mitigation1; Vulnerability and patch management in the CISSP exam3

A recent audit found that an organization's new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?

A.
Automated controls
A.
Automated controls
Answers
B.
Security policies
B.
Security policies
Answers
C.
Guidelines
C.
Guidelines
Answers
D.
Standards
D.
Standards
Answers
Suggested answer: D

Explanation:

Standards are the most important thing to review, as they define the specific and mandatory requirements for setting up new user accounts, such as the naming conventions, access rights, password policies, and expiration dates. Standards help to ensure consistency, security, and compliance across the organization's information systems and users. If the standards are not followed, the organization may face increased risks of unauthorized access, data breaches, or audit failures.

Reference= CISM Review Manual 2022, page 341; CISM Exam Content Outline, Domain 1, Knowledge Statement 1.32;CISM 2020: IT Security Policies;Information Security Policy, Standards, and Guidelines

Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?

A.
Review compliance requirements.
A.
Review compliance requirements.
Answers
B.
Communicate the exposure.
B.
Communicate the exposure.
Answers
C.
Declare an incident.
C.
Declare an incident.
Answers
D.
Change the encryption keys.
D.
Change the encryption keys.
Answers
Suggested answer: C

Explanation:

Declaring an incident is the best course of action when confidential information is inadvertently disseminated outside the organization, as it triggers the incident response process, which aims to contain, analyze, eradicate, recover, and learn from the incident. Declaring an incident also helps to communicate the exposure to the relevant stakeholders, such as senior management, legal authorities, customers, or regulators, and to comply with the applicable laws and regulations regarding notification and disclosure. Changing the encryption keys, reviewing compliance requirements, or communicating the exposure are possible steps within the incident response process, but they are not the first course of action.

Reference= CISM Review Manual 2022, page 3121; CISM Exam Content Outline, Domain 4, Task 4.12;CISM 2020: Incident Management;How to Respond to a Data Breach

Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?

A.
Mapping risk scenarios according to sensitivity of data
A.
Mapping risk scenarios according to sensitivity of data
Answers
B.
Reviewing mitigating and compensating controls for each risk scenario
B.
Reviewing mitigating and compensating controls for each risk scenario
Answers
C.
Mapping the risk scenarios by likelihood and impact on a chart
C.
Mapping the risk scenarios by likelihood and impact on a chart
Answers
D.
Performing a risk assessment on the laaS provider
D.
Performing a risk assessment on the laaS provider
Answers
Suggested answer: C

Explanation:

Mapping the risk scenarios by likelihood and impact on a chart is the best method of comparing risk scenarios, as it helps to visualize and prioritize the different types and levels of risks associated with each option. A chart can also facilitate the communication and decision-making process by showing the trade-offs and benefits of each option. A chart can be based on qualitative or quantitative data, depending on the availability and accuracy of the information.

Reference= CISM Review Manual 2022, page 371; CISM Exam Content Outline, Domain 1, Task 1.32;A risk assessment model for selecting cloud service providers;Security best practices for IaaS workloads in Azure

A PRIMARY benefit of adopting an information security framework is that it provides:

A.
credible emerging threat intelligence.
A.
credible emerging threat intelligence.
Answers
B.
security and vulnerability reporting guidelines.
B.
security and vulnerability reporting guidelines.
Answers
C.
common exploitability indices.
C.
common exploitability indices.
Answers
D.
standardized security controls.
D.
standardized security controls.
Answers
Suggested answer: D

Explanation:

A standardized security control is a set of rules, guidelines, or best practices that are designed to protect the confidentiality, integrity, and availability of information assets and systems. An information security framework is a collection of standardized security controls that are aligned with the organization's objectives, strategy, and risk appetite. Adopting an information security framework provides a primary benefit of ensuring consistency, efficiency, and effectiveness in the implementation and management of information security across the organization.

Reference= CISM Review Manual 2022, page 321; CISM Exam Content Outline, Domain 1, Knowledge Statement 1.22;What is an Information Security Framework?;Information Security Frameworks: What Are They and Why Do You Need One?

Which of the following should be the GREATEST concern for an information security manager when an annual audit reveals the organization's business continuity plan (BCP) has not been reviewed or updated in more than a year?

A.
An outdated BCP may result in less efficient recovery if an actual incident occurs.
A.
An outdated BCP may result in less efficient recovery if an actual incident occurs.
Answers
B.
The organization may suffer reputational damage for not following industry best practices.
B.
The organization may suffer reputational damage for not following industry best practices.
Answers
C.
The audit finding may impact the overall risk rating of the organization.
C.
The audit finding may impact the overall risk rating of the organization.
Answers
D.
The lack of updates to the BCP may result in noncompliance with internal policies.
D.
The lack of updates to the BCP may result in noncompliance with internal policies.
Answers
Suggested answer: A

Explanation:

A BCP is a document that outlines the processes and procedures to maintain or resume critical business functions and minimize the impact of a disruption on the organization's objectives, customers, and stakeholders. A BCP should be reviewed and updated regularly to reflect the changes in the organization's environment, risks, resources, and requirements. An outdated BCP may result in less efficient recovery if an actual incident occurs, as it may not account for the current situation, dependencies, priorities, or recovery strategies. This may lead to increased downtime, losses, or damages for the organization.

Reference= CISM Review Manual 2022, page 3101; CISM Exam Content Outline, Domain 4, Knowledge Statement 4.82; CISM 2020: Business Continuity3; Part Two: Business Continuity and Disaster Recovery Plans

Which of the following is the MOST appropriate metric to demonstrate the effectiveness of information security controls to senior management?

A.
Downtime due to malware infections
A.
Downtime due to malware infections
Answers
B.
Number of security vulnerabilities uncovered with network scans
B.
Number of security vulnerabilities uncovered with network scans
Answers
C.
Percentage of servers patched
C.
Percentage of servers patched
Answers
D.
Annualized loss resulting from security incidents
D.
Annualized loss resulting from security incidents
Answers
Suggested answer: D

Explanation:

Annualized loss resulting from security incidents is the most appropriate metric to demonstrate the effectiveness of information security controls to senior management, as it quantifies the financial impact of security breaches on the organization's assets, operations, and reputation. This metric helps to communicate the value of security investments, justify the security budget, and prioritize the security initiatives based on the potential loss reduction. Annualized loss resulting from security incidents can be calculated by multiplying the annualized rate of occurrence (ARO) of an incident by the single loss expectancy (SLE) of an incident. ARO is the estimated frequency of an incident occurring in a year, and SLE is the estimated cost of an incident. For example, if an organization estimates that a ransomware attack may occur once every two years, and that each attack may cost $100,000 to recover, then the annualized loss resulting from ransomware attacks is $50,000 ($100,000 / 2).

Reference= CISM Review Manual 2022, page 3171; CISM Exam Content Outline, Domain 4, Knowledge Statement 4.112;Key Performance Indicators for Security Governance, Part 1;Performance Measurement Guide for Information Security

An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?

A.
Employees use smartphone tethering when accessing from remote locations.
A.
Employees use smartphone tethering when accessing from remote locations.
Answers
B.
Employees physically lock PCs when leaving the immediate area.
B.
Employees physically lock PCs when leaving the immediate area.
Answers
C.
Employees are trained on the acceptable use policy.
C.
Employees are trained on the acceptable use policy.
Answers
D.
Employees use the VPN when accessing the organization's online resources.
D.
Employees use the VPN when accessing the organization's online resources.
Answers
Suggested answer: D

Explanation:

Using the VPN when accessing the organization's online resources is the most important thing to ensure, as it provides a secure and encrypted connection between the remote employees and the organization's network, and protects the data and systems from unauthorized access, interception, or tampering. VPNs also help to comply with the organization's security policies and standards, and to prevent data leakage or breaches.

Reference= CISM Review Manual 2022, page 3081; CISM Exam Content Outline, Domain 4, Knowledge Statement 4.92;CISM 2020: Remote Access Security;How to Secure Remote Workers with VPN

The business value of an information asset is derived from:

A.
the threat profile.
A.
the threat profile.
Answers
B.
its criticality.
B.
its criticality.
Answers
C.
the risk assessment.
C.
the risk assessment.
Answers
D.
its replacement cost.
D.
its replacement cost.
Answers
Suggested answer: B

Explanation:

The business value of an information asset is derived from its criticality, which is the degree of importance or dependency of the asset to the organization's objectives, operations, and stakeholders. The criticality of an information asset can be determined by assessing its impact on the confidentiality, integrity, and availability (CIA) of the information, as well as its sensitivity, classification, and regulatory requirements. The higher the criticality of an information asset, the higher its business value, and the more resources and controls are needed to protect it.

Reference= CISM Review Manual 2022, page 371; CISM Exam Content Outline, Domain 1, Task 1.32; IT Asset Valuation, Risk Assessment and Control Implementation Model1; Managing Data as an Asset3

Which of the following is the MOST important function of an information security steering committee?

A.
Assigning data classifications to organizational assets
A.
Assigning data classifications to organizational assets
Answers
B.
Developing organizational risk assessment processes
B.
Developing organizational risk assessment processes
Answers
C.
Obtaining multiple perspectives from the business
C.
Obtaining multiple perspectives from the business
Answers
D.
Defining security standards for logical access controls
D.
Defining security standards for logical access controls
Answers
Suggested answer: C

Explanation:

An information security steering committee is a group of senior executives and managers from different business units and functions who provide strategic direction, oversight, and support for the information security program. The most important function of the committee is to obtain multiple perspectives from the business, as this helps to ensure that the information security program aligns with the business goals, needs, and culture, and that the security decisions reflect the interests and expectations of the stakeholders.

Reference= CISM Review Manual 2022, page 331; CISM Exam Content Outline, Domain 1, Knowledge Statement 1.22; Improve Security Governance With a Security Steering Committee2; The Role of the Corporate Information Security Steering Committee3

Total 793 questions
Go to page: of 80