ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 59

Question list
Search
Search

List of questions

Search

An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?

A.
No owners were identified for some risks.
A.
No owners were identified for some risks.
Answers
B.
Business applications had the highest number of risks.
B.
Business applications had the highest number of risks.
Answers
C.
Risk mitigation action plans had no timelines.
C.
Risk mitigation action plans had no timelines.
Answers
D.
Risk mitigation action plan milestones were delayed.
D.
Risk mitigation action plan milestones were delayed.
Answers
Suggested answer: A

Explanation:

The most concerning issue for the information security steering committee should be that no owners were identified for some risks in the risk register. This means that there is no clear accountability and responsibility for managing and mitigating those risks, and that the risks may not be properly addressed or monitored. The risk owners are the persons who have the authority and ability to implement the risk treatment options and to accept the residual risk. The risk owners should be identified and assigned for each risk in the risk register, and they should report the status and progress of the risk management activities to the information security steering committee.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 2: Information Risk Management, Section: Risk Management, Subsection: Risk Register, Page 104.

Which of the following BEST illustrates residual risk within an organization?

A.
Heat map
A.
Heat map
Answers
B.
Risk management framework
B.
Risk management framework
Answers
C.
Business impact analysis (BIA)
C.
Business impact analysis (BIA)
Answers
D.
Balanced scorecard
D.
Balanced scorecard
Answers
Suggested answer: A

After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?

A.
Calculating cost of the incident
A.
Calculating cost of the incident
Answers
B.
Conducting a postmortem assessment
B.
Conducting a postmortem assessment
Answers
C.
Performing an impact analysis
C.
Performing an impact analysis
Answers
D.
Preserving the evidence
D.
Preserving the evidence
Answers
Suggested answer: B

Explanation:

The best way to determine corrective actions after a major information security incident is to conduct a postmortem assessment, which is a systematic and structured review of the incident, its causes, its impacts, and its lessons learned. A postmortem assessment can help to identify the root causes of the incident, the strengths and weaknesses of the incident response process, the gaps and deficiencies in the security controls, and the opportunities for improvement and remediation. A postmortem assessment can also help to document the recommendations and action plans for preventing or minimizing the recurrence of similar incidents in the future.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 4: Information Security Incident Management, Section: Incident Response, Subsection: Postincident Activities, Page 211.

Before approving the implementation of a new security solution, senior management requires a business case. Which of the following would BEST support the justification for investment?

A.
The solution contributes to business strategy.
A.
The solution contributes to business strategy.
Answers
B.
The solution improves business risk tolerance levels.
B.
The solution improves business risk tolerance levels.
Answers
C.
The solution improves business resiliency.
C.
The solution improves business resiliency.
Answers
D.
The solution reduces the cost of noncompliance with regulations.
D.
The solution reduces the cost of noncompliance with regulations.
Answers
Suggested answer: A

Explanation:

The best way to support the justification for investment in a new security solution is to show how the solution contributes to the business strategy of the organization. The business strategy defines the vision, mission, goals, and objectives of the organization, and the security solution should align with and support them. The security solution should also demonstrate how it adds value to the organization, such as by enabling new business opportunities, enhancing customer satisfaction, or increasing competitive advantage.The business case should include the expected benefits, costs, risks, and alternatives of the security solution, and provide a clear rationale for choosing the preferred option1.

Reference= CISM Review Manual, 16th Edition eBook2, Chapter 1: Information Security Governance, Section: Information Security Strategy, Subsection: Business Case Development, Page 33.

To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?

A.
Level of residual risk
A.
Level of residual risk
Answers
B.
Level of risk treatment
B.
Level of risk treatment
Answers
C.
Configuration parameters
C.
Configuration parameters
Answers
D.
Gap analysis results
D.
Gap analysis results
Answers
Suggested answer: A

Explanation:

The information security manager should compare the level of residual risk with the organization's risk appetite to inform a risk treatment decision. Residual risk is the risk that remains after applying the risk treatment options, such as avoiding, transferring, mitigating, or accepting the risk. Risk appetite is the amount of risk that the organization is willing to accept to achieve its objectives. The information security manager should ensure that the residual risk is within the risk appetite, and if not, apply additional risk treatment measures or escalate the risk to the senior management for approval.

Reference= CISM Review Manual, 16th Edition eBook1, Chapter 2: Information Risk Management, Section: Risk Management, Subsection: Risk Treatment, Page 102.

The PRIMARY objective of timely declaration of a disaster is to:

A.
ensure engagement of business management in the recovery process.
A.
ensure engagement of business management in the recovery process.
Answers
B.
assess and correct disaster recovery process deficiencies.
B.
assess and correct disaster recovery process deficiencies.
Answers
C.
protect critical physical assets from further loss.
C.
protect critical physical assets from further loss.
Answers
D.
ensure the continuity of the organization's essential services.
D.
ensure the continuity of the organization's essential services.
Answers
Suggested answer: D

Explanation:

The primary objective of timely declaration of a disaster is to ensure the continuity of the organization's essential services, which are the services that are critical for the survival and operation of the organization, and that cannot be interrupted or delayed without causing severe consequences. By declaring a disaster, the organization can activate its disaster recovery plan (DRP), which is a set of documented procedures and resources to recover the essential services in the event of a disaster.The DRP should include the roles and responsibilities, the communication channels, the recovery strategies, the backup and restoration procedures, and the testing and maintenance activities for the disaster recovery process1.

Reference= CISM Review Manual, 16th Edition eBook2, Chapter 9: Business Continuity and Disaster Recovery, Section: Disaster Recovery Planning, Subsection: Disaster Declaration, Page 372.

What should an information security manager verify FIRST when reviewing an information asset management program?

A.
System owners have been identified.
A.
System owners have been identified.
Answers
B.
Key applications have been secured.
B.
Key applications have been secured.
Answers
C.
Information assets have been classified.
C.
Information assets have been classified.
Answers
D.
Information assets have been inventoried.
D.
Information assets have been inventoried.
Answers
Suggested answer: C

Explanation:

According to the CISM Review Manual, information asset classification is the first step in an information asset management program, as it provides the basis for determining the level of protection required for each asset. System owners, key applications and information asset inventory are subsequent steps that depend on the classification of the assets.

Reference= CISM Review Manual, 27th Edition, Chapter 1, Section 1.4.2, page 381.

Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.

Which of the following should be the PRIMARY focus of Company A's information security manager?

A.
The organizational structure of Company B
A.
The organizational structure of Company B
Answers
B.
The cost to align to Company A's security policies
B.
The cost to align to Company A's security policies
Answers
C.
Company A's security architecture
C.
Company A's security architecture
Answers
D.
Company B's security policies
D.
Company B's security policies
Answers
Suggested answer: D

Explanation:

According to the CISM Review Manual, the security architecture of an organization defines the security principles, standards, guidelines and procedures that support the information security strategy and align with the business objectives. When acquiring another company, the information security manager of the acquiring company should focus on ensuring that the security architecture of the acquired company is compatible with its own, or that any gaps or conflicts are identified and resolved.

Reference= CISM Review Manual, 27th Edition, Chapter 2, Section 2.1.2, page 751.

An organization learns that a third party has outsourced critical functions to another external provider. Which of the following is the information security manager's MOST important course of action?

A.
Engage an independent audit of the third party's external provider.
A.
Engage an independent audit of the third party's external provider.
Answers
B.
Recommend canceling the contract with the third party.
B.
Recommend canceling the contract with the third party.
Answers
C.
Evaluate the third party's agreements with its external provider.
C.
Evaluate the third party's agreements with its external provider.
Answers
D.
Conduct an external audit of the contracted third party.
D.
Conduct an external audit of the contracted third party.
Answers
Suggested answer: C

Explanation:

According to the CISM Review Manual, the information security manager should evaluate the third party's agreements with its external provider to ensure that the security requirements and controls are adequate and consistent with the organization's expectations. Engaging or conducting an audit may be a subsequent step, but not the most important one. Recommending canceling the contract may be premature and impractical.

Reference= CISM Review Manual, 27th Edition, Chapter 3, Section 3.4.2, page 1431.

During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:

A.
perform a risk assessment.
A.
perform a risk assessment.
Answers
B.
review the state of security awareness.
B.
review the state of security awareness.
Answers
C.
review information security policies.
C.
review information security policies.
Answers
D.
perform a gap analysis.
D.
perform a gap analysis.
Answers
Suggested answer: A

Explanation:

According to the CISM Review Manual, performing a risk assessment is the most important course of action for an information security manager during the due diligence phase of an acquisition, as it helps to identify and evaluate the potential threats, vulnerabilities and impacts that may affect the information assets of the target organization. A risk assessment also provides the basis for performing a gap analysis, reviewing the information security policies and awareness, and developing a remediation plan.

Reference= CISM Review Manual, 27th Edition, Chapter 3, Section 3.4.1, page 1411.

Total 793 questions
Go to page: of 80