ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 60

Question list
Search
Search

Which of the following would be MOST useful when determining the business continuity strategy for a large organization's data center?

A.
Stakeholder feedback analysis
A.
Stakeholder feedback analysis
Answers
B.
Business continuity risk analysis
B.
Business continuity risk analysis
Answers
C.
Incident root cause analysis
C.
Incident root cause analysis
Answers
D.
Business impact analysis (BIA)
D.
Business impact analysis (BIA)
Answers
Suggested answer: D

Explanation:

According to the CISM Review Manual, a business impact analysis (BIA) is the most useful tool when determining the business continuity strategy for a large organization's data center, as it helps to identify and prioritize the critical business processes and resources that depend on the data center, and the impact of their disruption or loss. A BIA also provides the basis for defining the recovery time objectives (RTOs) and recovery point objectives (RPOs) for the data center, which guide the selection of the appropriate business continuity strategy.

Reference= CISM Review Manual, 27th Edition, Chapter 3, Section 3.5.2, page 1511.

An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?

A.
The cost and associated risk reduction
A.
The cost and associated risk reduction
Answers
B.
Benchmarks of industry peers impacted by ransomware
B.
Benchmarks of industry peers impacted by ransomware
Answers
C.
The number and severity of ransomware incidents
C.
The number and severity of ransomware incidents
Answers
D.
The total cost of the investment
D.
The total cost of the investment
Answers
Suggested answer: A

Explanation:

According to the CISM Review Manual, the most important metric to present to senior management when reporting on the performance of a risk mitigation initiative is the cost and associated risk reduction, as it demonstrates the value and effectiveness of the initiative in terms of reducing the likelihood and impact of the risk. The other metrics may be useful for comparison or analysis, but they do not directly measure the performance of the initiative.

Reference= CISM Review Manual, 27th Edition, Chapter 4, Section 4.3.2, page 2091.

Which of the following is MOST important to include in an information security status report to senior management?

A.
Key risk indicators (KRIs)
A.
Key risk indicators (KRIs)
Answers
B.
Review of information security policies
B.
Review of information security policies
Answers
C.
Information security budget requests
C.
Information security budget requests
Answers
D.
List of recent security events
D.
List of recent security events
Answers
Suggested answer: A

Explanation:

According to the CISM Review Manual, key risk indicators (KRIs) are the most important information to include in an information security status report to senior management, as they provide a measure of the current level of risk exposure and the effectiveness of the risk management activities. KRIs also help to identify trends, patterns and emerging risks that may require management attention or action.

Reference= CISM Review Manual, 27th Edition, Chapter 4, Section 4.3.2, page 209

Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?

A.
Perform a patch update.
A.
Perform a patch update.
Answers
B.
Conduct a risk assessment.
B.
Conduct a risk assessment.
Answers
C.
Perform a penetration test.
C.
Perform a penetration test.
Answers
D.
Conduct an impact assessment.
D.
Conduct an impact assessment.
Answers
Suggested answer: B

Explanation:

According to the CISM Review Manual, the first step an information security manager should take when a vulnerability has been disclosed is to conduct a risk assessment to determine the likelihood and impact of the vulnerability being exploited, and the appropriate response strategy. Performing a patch update, a penetration test or an impact assessment are possible subsequent steps, but not the first one.

Reference= CISM Review Manual, 27th Edition, Chapter 3, Section 3.3.2, page 1331.

To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:

A.
isolate the infected systems.
A.
isolate the infected systems.
Answers
B.
preserve the evidence.
B.
preserve the evidence.
Answers
C.
image the infected systems.
C.
image the infected systems.
Answers
D.
clean the malware.
D.
clean the malware.
Answers
Suggested answer: B

Explanation:

According to the CISM Review Manual, the incident response team should preserve the evidence as the first step to prepare for a third-party forensics investigation, as it helps to maintain the integrity and admissibility of the evidence in a court of law. Preserving the evidence may include isolating and imaging the infected systems, but these are not the only actions required. Cleaning the malware may destroy or alter the evidence and should be avoided until the investigation is completed.

Reference= CISM Review Manual, 27th Edition, Chapter 3, Section 3.6.2, page 165

Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?

A.
Enhanced data governance
A.
Enhanced data governance
Answers
B.
Increased third-party assurance
B.
Increased third-party assurance
Answers
C.
)Improved incident management
C.
)Improved incident management
Answers
D.
Reduced total cost of ownership (TCO)
D.
Reduced total cost of ownership (TCO)
Answers
Suggested answer: A

Explanation:

According to the web search results, a cloud access security broker (CASB) is a software solution that stands between the cloud service provider and the cloud service user to enforce security controls. One of the most important benefits of using a CASB when migrating to a cloud environment is enhanced data governance, as it helps to protect sensitive information from unauthorized access, sharing, or loss. A CASB can also provide data classification, encryption, data loss prevention (DLP), and other features that enable organizations to manage and secure their data in the cloud.

Reference=What Is a Cloud Access Security Broker (CASB)?,A beginner's guide to cloud access security brokers

An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?

A.
Calculate the return on investment (ROI).
A.
Calculate the return on investment (ROI).
Answers
B.
Provide security awareness training to HR.
B.
Provide security awareness training to HR.
Answers
C.
Benchmark the processes with best practice to identify gaps.
C.
Benchmark the processes with best practice to identify gaps.
Answers
D.
Assess the business objectives of the processes.
D.
Assess the business objectives of the processes.
Answers
Suggested answer: D

Which of the following is MOST important when developing an information security strategy?

A.
Engage stakeholders.
A.
Engage stakeholders.
Answers
B.
Assign data ownership.
B.
Assign data ownership.
Answers
C.
Determine information types.
C.
Determine information types.
Answers
D.
Classify information assets.
D.
Classify information assets.
Answers
Suggested answer: A

Explanation:

According to the CISM Review Manual, engaging stakeholders is the most important step when developing an information security strategy, as it helps to ensure that the strategy is aligned with the business objectives, expectations, and requirements of the stakeholders. Engaging stakeholders also helps to gain their support and commitment for the implementation and maintenance of the strategy. Assigning data ownership, determining information types, and classifying information assets are possible subsequent steps, but not the most important one.

Reference= CISM Review Manual, 27th Edition, Chapter 2, Section 2.1.1, page 731.

Which of the following is the MOST effective defense against malicious insiders compromising confidential information?

A.
Regular audits of access controls
A.
Regular audits of access controls
Answers
B.
Strong background checks when hiring staff
B.
Strong background checks when hiring staff
Answers
C.
Prompt termination procedures
C.
Prompt termination procedures
Answers
D.
Role-based access control (RBAC)
D.
Role-based access control (RBAC)
Answers
Suggested answer: D

Explanation:

role-based access control (RBAC) is the most effective defense against malicious insiders compromising confidential information, as it helps to limit the access of users to the information and resources that are necessary for their roles and responsibilities. RBAC also helps to enforce the principle of least privilege, which reduces the risk of unauthorized or inappropriate access, disclosure, modification, or destruction of information by insiders. RBAC also facilitates the monitoring and auditing of user activities and access rights.

Reference=Malicious insiders | Cyber.gov.au,Insider Threat Mitigation Guide - CISA,Malicious Insiders: Types, Indicators & Common Techniques - Ekran System

Which of the following BEST enables an organization to identify and contain security incidents?

A.
Risk assessments
A.
Risk assessments
Answers
B.
Threat modeling
B.
Threat modeling
Answers
C.
Continuous monitoring
C.
Continuous monitoring
Answers
D.
Tabletop exercises
D.
Tabletop exercises
Answers
Suggested answer: C

Explanation:

= Continuous monitoring is the process of collecting, analyzing, and reporting on the security status of an organization's information systems and networks. Continuous monitoring enables an organization to identify and contain security incidents by providing timely and accurate information on the security events, alerts, incidents, and threats that may affect the organization. Continuous monitoring also helps to measure the effectiveness and compliance of the security controls, policies, and procedures that are implemented to protect the organization's information assets. Continuous monitoring can be performed using various tools and methods, such as security information and event management (SIEM) tools, intrusion detection and prevention systems (IDS/IPS), vulnerability scanners, log analyzers, and audit trails.

Reference= CISM Manual1, Chapter 6: Incident Response Planning (IRP), Section 6.2: Continuous Monitoring2

1: https://store.isaca.org/s/store#/store/browse/cat/a2D4w00000Ac6NNEAZ/tiles2:3

Total 793 questions
Go to page: of 80