ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 58

Question list
Search
Search

List of questions

Search

An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?

A.
Internal IT audit
A.
Internal IT audit
Answers
B.
The data custodian
B.
The data custodian
Answers
C.
The information security manager
C.
The information security manager
Answers
D.
The data owner
D.
The data owner
Answers
Suggested answer: D

Explanation:

The data owner is the person who has the authority and responsibility to classify, grant access, and monitor the use of the CRM data. The data owner should ensure that the data is protected according to its classification and business requirements. The data custodian is the person who implements the controls and procedures to protect the data as directed by the data owner. The information security manager is the person who advises the data owner on the best practices and standards for data security. The internal IT audit is the function that evaluates the effectiveness and compliance of the data security controls and procedures.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 1: Information Security Governance, Section: Information Security Roles and Responsibilities, Subsection: Data Owner, Page 23.

Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?

A.
To enforce security policy requirements
A.
To enforce security policy requirements
Answers
B.
To maintain business asset inventories
B.
To maintain business asset inventories
Answers
C.
To ensure audit and compliance requirements are met
C.
To ensure audit and compliance requirements are met
Answers
D.
To ensure the availability of business operations
D.
To ensure the availability of business operations
Answers
Suggested answer: D

Explanation:

The primary reason to regularly update business continuity and disaster recovery documents is to ensure that the plans and procedures are aligned with the current business needs and objectives, and that they can effectively support the availability of business operations in the event of a disaster. Updating the documents also helps to enforce security policy requirements, maintain business asset inventories, and ensure audit and compliance requirements are met, but these are secondary benefits.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 9: Business Continuity and Disaster Recovery, Section: Business Continuity Planning, Subsection: Business Continuity Plan Maintenance, Page 378.

The PRIMARY reason for creating a business case when proposing an information security project is to:

A.
articulate inherent risks.
A.
articulate inherent risks.
Answers
B.
provide demonstrated return on investment (ROI).
B.
provide demonstrated return on investment (ROI).
Answers
C.
establish the value of the project in relation to business objectives.
C.
establish the value of the project in relation to business objectives.
Answers
D.
gain key business stakeholder engagement.
D.
gain key business stakeholder engagement.
Answers
Suggested answer: C

Explanation:

The primary reason for creating a business case when proposing an information security project is to establish the value of the project in relation to the business objectives and to justify the investment required. A business case should demonstrate how the project aligns with the organization's strategy, goals, and mission, and how it supports the business processes and functions. A business case should also include the expected benefits, costs, risks, and alternatives of the project, and provide a clear rationale for choosing the preferred option.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 1: Information Security Governance, Section: Information Security Strategy, Subsection: Business Case Development, Page 33.

Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?

A.
The plan is reviewed by senior and IT operational management.
A.
The plan is reviewed by senior and IT operational management.
Answers
B.
The plan is based on industry best practices.
B.
The plan is based on industry best practices.
Answers
C.
Process steps are documented by the disaster recovery team.
C.
Process steps are documented by the disaster recovery team.
Answers
D.
Procedures are available at the primary and failover location.
D.
Procedures are available at the primary and failover location.
Answers
Suggested answer: D

Explanation:

The best way to ensure the effective execution of a disaster recovery plan (DRP) is to make sure that the procedures are available at both the primary and the failover location, so that the staff can access them in case of a disaster. The procedures should be clear, concise, and updated regularly to reflect the current situation and requirements. Having the procedures available at both locations also helps to avoid confusion and delays in the recovery process.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 9: Business Continuity and Disaster Recovery, Section: Disaster Recovery Planning, Subsection: Disaster Recovery Plan Development, Page 373.

The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:

A.
)the information security officer.
A.
)the information security officer.
Answers
B.
the steering committee.
B.
the steering committee.
Answers
C.
the board of directors.
C.
the board of directors.
Answers
D.
the internal audit manager.
D.
the internal audit manager.
Answers
Suggested answer: C

Explanation:

The ultimate responsibility for ensuring the objectives of an information security framework are being met belongs to the board of directors, as they are accountable for the governance of the organization and the oversight of the information security strategy. The board of directors should ensure that the information security framework aligns with the business objectives, supports the business processes, and complies with the legal and regulatory requirements. The board of directors should also monitor the performance and effectiveness of the information security framework and provide guidance and direction for its improvement.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 1: Information Security Governance, Section: Enterprise Governance, Subsection: Board of Directors, Page 18.

A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?

A.
Update in accordance with the best business practices.
A.
Update in accordance with the best business practices.
Answers
B.
Perform a risk assessment of the current IT environment.
B.
Perform a risk assessment of the current IT environment.
Answers
C.
Gain an understanding of the current business direction.
C.
Gain an understanding of the current business direction.
Answers
D.
Inventory and review current security policies.
D.
Inventory and review current security policies.
Answers
Suggested answer: D

Explanation:

The next step for the information security manager should be to inventory and review the current security policies to understand the existing security requirements, controls, and gaps. This will help to identify the areas that need to be updated, revised, or replaced to align with the current business needs and objectives, as well as the legal and regulatory requirements. Updating the policies in accordance with the best business practices, performing a risk assessment of the current IT environment, or gaining an understanding of the current business direction are important activities, but they should be done after reviewing the current security policies.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 1: Information Security Governance, Section: Information Security Policies, Standards, Procedures and Guidelines, Subsection: Information Security Policies, Page 28.

A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?

A.
Right of the subscriber to conduct onsite audits of the vendor
A.
Right of the subscriber to conduct onsite audits of the vendor
Answers
B.
Escrow of software code with conditions for code release
B.
Escrow of software code with conditions for code release
Answers
C.
Authority of the subscriber to approve access to its data
C.
Authority of the subscriber to approve access to its data
Answers
D.
Commingling of subscribers' data on the same physical server
D.
Commingling of subscribers' data on the same physical server
Answers
Suggested answer: C

Explanation:

The greatest concern to an information security manager if omitted from the contract with a multinational cloud computing vendor would be the authority of the subscriber to approve access to its data. This is because the subscriber's data may be subject to different legal and regulatory requirements in different jurisdictions, and the subscriber may lose control over who can access, process, or disclose its data. The subscriber should have the right to approve or deny access to its data by the vendor or any third parties, and to ensure that the vendor complies with the applicable data protection laws and standards.The authority of the subscriber to approve access to its data is also one of the key elements of the ISACA Cloud Computing Management Audit/Assurance Program1.

Reference= CISM Review Manual, 16th Edition eBook2, Chapter 3: Information Security Program Development and Management, Section: Information Security Program Management, Subsection: Cloud Computing, Page 142.

Which of the following is MOST appropriate to communicate to senior management regarding information risk?

A.
Defined risk appetite
A.
Defined risk appetite
Answers
B.
Emerging security technologies
B.
Emerging security technologies
Answers
C.
Vulnerability scanning progress
C.
Vulnerability scanning progress
Answers
D.
Risk profile changes
D.
Risk profile changes
Answers
Suggested answer: D

Explanation:

The most appropriate information to communicate to senior management regarding information risk is the risk profile changes, which reflect the current level and nature of the risks that the organization faces. The risk profile changes can help senior management to understand the impact of the risks on the business objectives, the effectiveness of the risk management strategy, and the need for any adjustments or improvements. The risk profile changes can also help senior management to prioritize the allocation of resources and to make informed decisions.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 2: Information Risk Management, Section: Risk Communication, Subsection: Risk Reporting, Page 97.

Which of the following is MOST important when designing security controls for new cloud-based services?

A.
Evaluating different types of deployment models according to the associated risks
A.
Evaluating different types of deployment models according to the associated risks
Answers
B.
Understanding the business and IT strategy for moving resources to the cloud
B.
Understanding the business and IT strategy for moving resources to the cloud
Answers
C.
Defining an incident response policy to protect data moving between onsite and cloud applications
C.
Defining an incident response policy to protect data moving between onsite and cloud applications
Answers
D.
Performing a business impact analysis (BIA) to gather information needed to develop recovery strategies
D.
Performing a business impact analysis (BIA) to gather information needed to develop recovery strategies
Answers
Suggested answer: B

Explanation:

The most important factor when designing security controls for new cloud-based services is to understand the business and IT strategy for moving resources to the cloud. This will help to align the security controls with the business objectives, requirements, and risks, and to select the appropriate cloud service delivery and deployment models. The security controls should also be based on the shared responsibility model, which defines the roles and responsibilities of the cloud service provider and the cloud customer in ensuring the security of the cloud environment. Evaluating different types of deployment models, defining an incident response policy, and performing a business impact analysis are also important activities, but they should be done after understanding the business and IT strategy.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 3: Information Security Program Development and Management, Section: Information Security Program Management, Subsection: Cloud Computing, Page 141-142.

A KEY consideration in the use of quantitative risk analysis is that it:

A.
aligns with best practice for risk analysis of information assets.
A.
aligns with best practice for risk analysis of information assets.
Answers
B.
assigns numeric values to exposures of information assets.
B.
assigns numeric values to exposures of information assets.
Answers
C.
applies commonly used labels to information assets.
C.
applies commonly used labels to information assets.
Answers
D.
is based on criticality analysis of information assets.
D.
is based on criticality analysis of information assets.
Answers
Suggested answer: B

Explanation:

A key consideration in the use of quantitative risk analysis is that it assigns numeric values to exposures of information assets, such as the probability of occurrence, the frequency of occurrence, the impact of occurrence, and the monetary value of the assets. These numeric values help to measure and compare the risks in a more objective and consistent way, and to support the decision-making process based on cost-benefit analysis. Quantitative risk analysis also requires reliable and accurate data sources, and it may involve the use of statistical tools and techniques.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 2: Information Risk Management, Section: Risk Analysis, Subsection: Quantitative Risk Analysis, Page 84.

Total 793 questions
Go to page: of 80