ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 57

Question list
Search
Search

List of questions

Search

Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?

A.
Residual risk
A.
Residual risk
Answers
B.
Regulatory requirements
B.
Regulatory requirements
Answers
C.
Risk tolerance
C.
Risk tolerance
Answers
D.
Control objectives
D.
Control objectives
Answers
Suggested answer: C

Explanation:

The primary basis for establishing metrics that measure the effectiveness of an information security program should be the risk tolerance of the organization, which is the degree of risk that the organization is willing to accept or avoid in pursuit of its objectives. Metrics based on risk tolerance can help to evaluate whether the information security program is aligned with the business strategy, supports the risk management process, and delivers value to the organization. Residual risk, regulatory requirements, and control objectives are also important factors to consider when developing metrics, but they are not as fundamental as the risk tolerance.

Reference= CISM Review Manual, 16th Edition, page 69

During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?

A.
The certification includes industry-recognized security controls.
A.
The certification includes industry-recognized security controls.
Answers
B.
The certification was issued within the last five years.
B.
The certification was issued within the last five years.
Answers
C.
The certification is issued for the specific scope.
C.
The certification is issued for the specific scope.
Answers
D.
The certification is easily verified.
D.
The certification is easily verified.
Answers
Suggested answer: C

Explanation:

The most important consideration when selecting a SaaS vendor for a business process is whether the vendor's information security certification is issued for the specific scope of the service that the organization needs. A certification that covers the entire vendor organization or a different service may not be relevant or sufficient for the organization's security requirements. The certification should also include industry-recognized security controls, be issued within a reasonable time frame, and be easily verified, but these are not as critical as the scope.

Reference= CISM Review Manual, 16th Edition, page 1841; 5 Top SaaS Security Certifications for SaaS Providers

Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?

A.
Decrease in false positives
A.
Decrease in false positives
Answers
B.
Increase in false positives
B.
Increase in false positives
Answers
C.
Increase in false negatives
C.
Increase in false negatives
Answers
D.
Decrease in false negatives
D.
Decrease in false negatives
Answers
Suggested answer: C

Explanation:

An increase in false negatives would be of greatest concern when reviewing the performance of an organization's IDSs, because it means that the IDSs are failing to detect and alert on actual attacks that are occurring on the network. False negatives can lead to serious security breaches, data loss, reputational damage, and legal liabilities for the organization. False positives, on the other hand, are alerts that are triggered by benign or normal activities that are mistaken for attacks. False positives can cause annoyance, inefficiency, and desensitization, but they do not pose a direct threat to the security of the network. Therefore, a decrease in false positives would be desirable, and an increase in false positives would be less concerning than an increase in false negatives.

Reference= CISM Review Manual, 16th Edition, page 2231; Intrusion Detection Systems | NIST

An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?

A.
Implementing automated vulnerability scanning in the help desk workflow
A.
Implementing automated vulnerability scanning in the help desk workflow
Answers
B.
Changing the default setting for all security incidents to the highest priority
B.
Changing the default setting for all security incidents to the highest priority
Answers
C.
Integrating automated service level agreement (SLA) reporting into the help desk ticketing system
C.
Integrating automated service level agreement (SLA) reporting into the help desk ticketing system
Answers
D.
Integrating incident response workflow into the help desk ticketing system
D.
Integrating incident response workflow into the help desk ticketing system
Answers
Suggested answer: D

Explanation:

The best automated control to resolve the issue of security incidents not being appropriately escalated by the help desk is to integrate incident response workflow into the help desk ticketing system. This will ensure that the help desk staff follow the predefined steps and procedures for handling and escalating security incidents, based on the severity, impact, and urgency of each incident. The incident response workflow will also provide clear guidance on who to notify, when to notify, and how to notify the relevant stakeholders and authorities. This will improve the efficiency, effectiveness, and consistency of the incident response process.

Reference= CISM Review Manual, 16th Edition, page 2901; A Practical Approach to Incident Management Escalation2

An internal audit has revealed that a number of information assets have been inappropriately classified. To correct the classifications, the remediation accountability should be assigned to:

A.
the business users.
A.
the business users.
Answers
B.
the information owners.
B.
the information owners.
Answers
C.
the system administrators.
C.
the system administrators.
Answers
D.
senior management.
D.
senior management.
Answers
Suggested answer: B

Explanation:

The best automated control to resolve the issue of security incidents not being appropriately escalated by the help desk is to integrate incident response workflow into the help desk ticketing system. This will ensure that the help desk staff follow the predefined steps and procedures for handling and escalating security incidents, based on the severity, impact, and urgency of each incident. The incident response workflow will also provide clear guidance on who to notify, when to notify, and how to notify the relevant stakeholders and authorities. This will improve the efficiency, effectiveness, and consistency of the incident response process.

Reference= CISM Review Manual, 16th Edition, page 2901; A Practical Approach to Incident Management Escalation2

Which of the following roles is BEST suited to validate user access requirements during an annual user access review?

A.
Access manager
A.
Access manager
Answers
B.
IT director
B.
IT director
Answers
C.
System administrator
C.
System administrator
Answers
D.
Business owner
D.
Business owner
Answers
Suggested answer: D

Explanation:

The business owner is the best suited role to validate user access requirements during an annual user access review, because the business owner is responsible for determining the business needs and objectives of the users, as well as defining the appropriate access rights and privileges for each user role.The business owner is also accountable for ensuring that the user access is aligned with the organization's policies and standards, and that the user access review is conducted effectively and efficiently1. The access manager, the IT director, and the system administrator are not as suitable as the business owner, because they are more involved in the technical and operational aspects of user access management, rather than the business aspects.

Reference= Effective User Access Reviews

When developing an incident escalation process, the BEST approach is to classify incidents based on:

A.
estimated time to recover.
A.
estimated time to recover.
Answers
B.
information assets affected.
B.
information assets affected.
Answers
C.
recovery point objectives (RPOs).
C.
recovery point objectives (RPOs).
Answers
D.
their root causes.
D.
their root causes.
Answers
Suggested answer: B

Explanation:

The best approach to developing an incident escalation process is to classify incidents based on the information assets affected, because this will help to determine the impact and severity of the incidents, as well as the appropriate response and recovery actions. The information assets affected by an incident can indicate the potential loss of confidentiality, integrity, or availability of the information, as well as the legal, regulatory, contractual, or reputational implications. By classifying incidents based on the information assets affected, the organization can prioritize the incidents and escalate them to the relevant stakeholders and authorities.

Reference= CISM Review Manual, 16th Edition, page 2901; A Practical Approach to Incident Management Escalation2

Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?

A.
Information security manager
A.
Information security manager
Answers
B.
Chief risk officer (CRO)
B.
Chief risk officer (CRO)
Answers
C.
Information security steering committee
C.
Information security steering committee
Answers
D.
Risk owner
D.
Risk owner
Answers
Suggested answer: D

Explanation:

The risk owner is the best positioned to be accountable for risk acceptance decisions based on risk appetite, because the risk owner is the person or entity with the accountability and authority to manage a risk1.The risk owner is responsible for evaluating the risk level, comparing it with the risk appetite, and deciding whether to accept, avoid, transfer, or mitigate the risk2.The risk owner is also accountable for monitoring and reporting on the risk status and outcomes3. The information security manager, the chief risk officer (CRO), and the information security steering committee may have some roles and responsibilities in the risk management process, but they are not the primary accountable parties for risk acceptance decisions.

Reference= CISM Review Manual, 16th Edition, page 754; Risk Acceptance

Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?

A.
Enforce the local regulation.
A.
Enforce the local regulation.
Answers
B.
Obtain legal guidance.
B.
Obtain legal guidance.
Answers
C.
Enforce the organization's information security policy.
C.
Enforce the organization's information security policy.
Answers
D.
Obtain an independent assessment of the regulation.
D.
Obtain an independent assessment of the regulation.
Answers
Suggested answer: B

Explanation:

The information security manager should first obtain legal guidance when there is a conflict between the organization's information security policy and a local regulation, because this will help to understand the implications and consequences of the conflict, and to identify the possible options and solutions for resolving it. The information security manager should also consult with the relevant stakeholders, such as senior management, business owners, and information owners, to determine the best course of action that aligns with the organization's objectives, risk appetite, and compliance obligations. Enforcing the local regulation or the organization's information security policy without legal guidance may expose the organization to legal liabilities, security risks, or operational disruptions. Obtaining an independent assessment of the regulation may be helpful, but it is not the first step to take.

Reference= CISM Review Manual, 16th Edition, page 691; A Guide to ISACA CISM Domains & Domain 1: Information Security Governance2

Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?

A.
Update the risk register.
A.
Update the risk register.
Answers
B.
Consult with the business owner.
B.
Consult with the business owner.
Answers
C.
Restrict application network access temporarily.
C.
Restrict application network access temporarily.
Answers
D.
Include security requirements in the contract.
D.
Include security requirements in the contract.
Answers
Suggested answer: B

Explanation:

The information security manager should first consult with the business owner to understand the business needs and objectives for using the new cloud application, and to discuss the possible alternatives or compensating controls that can mitigate the risk. Updating the risk register, restricting application network access, or including security requirements in the contract are possible actions to take after consulting with the business owner.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 1: Information Security Governance, Section: Risk Management, Subsection: Risk Treatment, Page 49.

Total 793 questions
Go to page: of 80