ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 55

Question list
Search
Search

Which of the following is the BEST indicator of the maturity level of a vendor risk management process?

A.
Average time required to complete the vendor risk management process
A.
Average time required to complete the vendor risk management process
Answers
B.
Percentage of vendors that have gone through the vendor onboarding process
B.
Percentage of vendors that have gone through the vendor onboarding process
Answers
C.
Percentage of vendors that are regularly reviewed against defined criteria
C.
Percentage of vendors that are regularly reviewed against defined criteria
Answers
D.
Number of vendors rejected because of security review results
D.
Number of vendors rejected because of security review results
Answers
Suggested answer: C

Explanation:

The percentage of vendors that are regularly reviewed against defined criteria is the best indicator of the maturity level of a vendor risk management process, as it reflects the extent to which the organization has established and implemented a consistent, repeatable, and effective process to monitor and evaluate the security performance and compliance of its vendors. A high percentage indicates a mature process that covers all vendors and applies clear and relevant criteria based on the organization's risk appetite and objectives. A low percentage indicates a less mature process that may be ad hoc, incomplete, or outdated. (From CISM Review Manual 15th Edition)

Which of the following should be the PRIMARY focus of a status report on the information security program to senior management?

A.
Providing evidence that resources are performing as expected
A.
Providing evidence that resources are performing as expected
Answers
B.
Verifying security costs do not exceed the budget
B.
Verifying security costs do not exceed the budget
Answers
C.
Demonstrating risk is managed at the desired level
C.
Demonstrating risk is managed at the desired level
Answers
D.
Confirming the organization complies with security policies
D.
Confirming the organization complies with security policies
Answers
Suggested answer: C

Explanation:

The primary focus of a status report on the information security program to senior management is to demonstrate that the risk to the organization's information assets is managed at the desired level, in alignment with the business objectives and risk appetite. This can be achieved by providing relevant and meaningful metrics, indicators, and trends that show the performance, effectiveness, and value of the information security program, as well as the current and emerging risks and the corresponding mitigation strategies. (From CISM Review Manual 15th Edition)

Which of the following is the BEST indication that an organization has integrated information security governance with corporate governance?

A.
Security performance metrics are measured against business objectives.
A.
Security performance metrics are measured against business objectives.
Answers
B.
Impact is measured according to business loss when assessing IT risk.
B.
Impact is measured according to business loss when assessing IT risk.
Answers
C.
Security policies are reviewed whenever business objectives are changed.
C.
Security policies are reviewed whenever business objectives are changed.
Answers
D.
Service levels for security vendors are defined according to business needs.
D.
Service levels for security vendors are defined according to business needs.
Answers
Suggested answer: A

Explanation:

Security performance metrics are quantitative or qualitative measures that indicate the effectiveness and efficiency of the information security program in achieving the organization's security goals and objectives. Measuring security performance metrics against business objectives is the best indication that an organization has integrated information security governance with corporate governance, as it demonstrates that the security program is aligned with and supports the business strategy, value delivery, and risk management. (From CISM Review Manual 15th Edition)

Which of the following is the PRIMARY objective of a cyber resilience strategy?

A.
Business continuity
A.
Business continuity
Answers
B.
Regulatory compliance
B.
Regulatory compliance
Answers
C.
Employee awareness
C.
Employee awareness
Answers
D.
Executive support
D.
Executive support
Answers
Suggested answer: A

Explanation:

Business continuity is the primary objective of a cyber resilience strategy, as it aims to ensure that the organization can continue to deliver its essential products and services in the face of cyber disruptions, and recover to normal operations as quickly and effectively as possible. A cyber resilience strategy should align with the business continuity plan and support the organization's mission, vision, and values. (From CISM Review Manual 15th Edition)

Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?

A.
Information security program metrics
A.
Information security program metrics
Answers
B.
Results of a recent external audit
B.
Results of a recent external audit
Answers
C.
The information security operations matrix
C.
The information security operations matrix
Answers
D.
Changes to information security risks
D.
Changes to information security risks
Answers
Suggested answer: A

Explanation:

Information security program metrics are the best way to demonstrate the status of an organization's information security program to the board of directors, as they provide relevant and meaningful information on the performance, effectiveness, and value of the program, as well as the current and emerging risks and the corresponding mitigation strategies. Information security program metrics should be aligned with the business objectives and risk appetite of the organization, and should be presented in a clear and concise manner that enables the board of directors to make informed decisions and provide oversight. (From CISM Review Manual 15th Edition)

When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?

A.
Digital currency is immediately available.
A.
Digital currency is immediately available.
Answers
B.
Network access requires two-factor authentication.
B.
Network access requires two-factor authentication.
Answers
C.
Data backups are recoverable from an offsite location.
C.
Data backups are recoverable from an offsite location.
Answers
D.
An alternative network link is immediately available.
D.
An alternative network link is immediately available.
Answers
Suggested answer: C

Explanation:

Data backups are recoverable from an offsite location is the most important thing to verify when testing an incident response plan for recovery from a ransomware attack, as it ensures that the organization can restore its data and resume its operations without paying the ransom or losing critical information. Data backups should be performed regularly, stored securely, and tested for integrity and availability. (From CISM Review Manual 15th Edition)

Which of the following elements of a service contract would BEST enable an organization to monitor the information security risk associated with a cloud service provider?

A.
Indemnification clause
A.
Indemnification clause
Answers
B.
Breach detection and notification
B.
Breach detection and notification
Answers
C.
Compliance status reporting
C.
Compliance status reporting
Answers
D.
Physical access to service provider premises
D.
Physical access to service provider premises
Answers
Suggested answer: C

Explanation:

Compliance status reporting is the best element of a service contract that would enable an organization to monitor the information security risk associated with a cloud service provider, as it provides the organization with regular and timely information on the cloud service provider's compliance with the agreed-upon security requirements, standards, and regulations. Compliance status reporting also helps the organization to identify any gaps or issues that need to be addressed or resolved, and to verify the effectiveness of the cloud service provider's controls. (From CISM Review Manual 15th Edition)

The PRIMARY purpose for continuous monitoring of security controls is to ensure:

A.
system availability.
A.
system availability.
Answers
B.
control gaps are minimized.
B.
control gaps are minimized.
Answers
C.
alignment with compliance requirements.
C.
alignment with compliance requirements.
Answers
D.
effectiveness of controls.
D.
effectiveness of controls.
Answers
Suggested answer: D

Explanation:

The primary purpose for continuous monitoring of security controls is to ensure that the controls are effective in achieving the desired security objectives and mitigating the identified risks. Continuous monitoring provides ongoing assurance that the planned and implemented security controls are aligned with the organizational risk tolerance and can respond to changes in the threat environment, the system, or the business processes. Continuous monitoring also helps to identify and address any control weaknesses or gaps in a timely manner.(From CISM Review Manual 15th Edition and NIST Special Publication 800-1371)

Which of the following is the MOST effective way to ensure the security of services and solutions delivered by third-party vendors?

A.
Integrate risk management into the vendor management process.
A.
Integrate risk management into the vendor management process.
Answers
B.
Conduct security reviews on the services and solutions delivered.
B.
Conduct security reviews on the services and solutions delivered.
Answers
C.
Review third-party contracts as part of the vendor management process.
C.
Review third-party contracts as part of the vendor management process.
Answers
D.
Perform an audit on vendors' security controls and practices.
D.
Perform an audit on vendors' security controls and practices.
Answers
Suggested answer: A

Explanation:

Integrating risk management into the vendor management process is the most effective way to ensure the security of services and solutions delivered by third-party vendors, as it enables the organization to identify, assess, treat, and monitor the risks associated with outsourcing. Risk management should be applied throughout the vendor life cycle, from selection, contracting, onboarding, monitoring, to termination. Risk management also helps the organization to define the security requirements, expectations, and responsibilities for the vendors, and to evaluate their performance and compliance. (From CISM Review Manual 15th Edition)

Who has the PRIMARY authority to decide if additional risk treatments are required to mitigate an identified risk?

A.
Information security manager
A.
Information security manager
Answers
B.
IT risk manager
B.
IT risk manager
Answers
C.
Internal auditor
C.
Internal auditor
Answers
D.
Risk owner
D.
Risk owner
Answers
Suggested answer: D

Explanation:

The risk owner is the person who has the authority and accountability to make decisions about the risk, including whether to accept, avoid, transfer, or mitigate it. The risk owner is also responsible for implementing and monitoring the risk treatment plan and reporting on the risk status. The risk owner is usually the business process owner or the information owner of the asset affected by the risk. (From CISM Review Manual 15th Edition)

Total 793 questions
Go to page: of 80