ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 63

Question list
Search
Search

List of questions

Search

During which phase of an incident response plan is the root cause determined?

A.
Recovery
A.
Recovery
Answers
B.
Lessons learned
B.
Lessons learned
Answers
C.
Containment
C.
Containment
Answers
D.
Eradication
D.
Eradication
Answers
Suggested answer: D

Explanation:

The eradication phase of an incident response plan is where the root cause of the incident is determined and eliminated. This phase involves identifying and removing all traces of the malicious activity from the affected systems and restoring them to a secure state.

Reference=NIST SP 800-61 Revision 2,CISM Review Manual 15th Edition

Which of the following BEST helps to enable the desired information security culture within an organization?

A.
Information security awareness training and campaigns
A.
Information security awareness training and campaigns
Answers
B.
Effective information security policies and procedures
B.
Effective information security policies and procedures
Answers
C.
Delegation of information security roles and responsibilities
C.
Delegation of information security roles and responsibilities
Answers
D.
Incentives for appropriate information security-related behavior
D.
Incentives for appropriate information security-related behavior
Answers
Suggested answer: A

Explanation:

Information security awareness training and campaigns are the best way to enable the desired information security culture within an organization because they help to educate, motivate and influence the behavior and attitude of the employees towards information security. They also help to raise the awareness of the risks, threats and best practices of information security among the staff and stakeholders.

Reference=Organizational Culture for Information Security: A Systemic Perspective on the Articulation of Human, Cultural and Social Systems,CISM Exam Content Outline

Which of the following is MOST appropriate to communicate to senior management regarding information risk?

A.
Emerging security technologies
A.
Emerging security technologies
Answers
B.
Risk profile changes
B.
Risk profile changes
Answers
C.
Defined risk appetite
C.
Defined risk appetite
Answers
D.
Vulnerability scanning progress
D.
Vulnerability scanning progress
Answers
Suggested answer: B

Explanation:

Risk profile changes are the most appropriate to communicate to senior management regarding information risk because they reflect the current level and nature of the risks that the organization faces and how they may affect its objectives and performance. Senior management needs to be aware of any changes in the risk profile so that they can make informed decisions and allocate resources accordingly. Risk profile changes also help senior management monitor the effectiveness of the risk management process and identify any gaps or weaknesses that need to be addressed.

Reference=Communicating Information Security Risk Simply and Effectively, Part 1,CISM Domain 2: Information Risk Management (IRM) [2022 update]

Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?

A.
Perform a risk analysis for critical applications.
A.
Perform a risk analysis for critical applications.
Answers
B.
Determine whether critical success factors (CSFs) have been defined.
B.
Determine whether critical success factors (CSFs) have been defined.
Answers
C.
Conduct a capability maturity model evaluation.
C.
Conduct a capability maturity model evaluation.
Answers
D.
Review and update current operational procedures.
D.
Review and update current operational procedures.
Answers
Suggested answer: C

Explanation:

A capability maturity model evaluation is the best way to determine the gap between the present and desired state of an information security program because it provides a systematic and structured approach to assess the current level of maturity of the information security processes and practices, and compare them with the desired or target level of maturity that is aligned with the business objectives and requirements. A capability maturity model evaluation can also help to identify the strengths and weaknesses of the information security program, prioritize the improvement areas, and develop a roadmap for achieving the desired state.

Reference=Information Security Architecture: Gap Assessment and Prioritization,CISM Review Manual 15th Edition

Which of the following should be the FIRST step when performing triage of a malware incident?

A.
Containing the affected system
A.
Containing the affected system
Answers
B.
Preserving the forensic image
B.
Preserving the forensic image
Answers
C.
Comparing backup against production
C.
Comparing backup against production
Answers
D.
Removing the malware
D.
Removing the malware
Answers
Suggested answer: A

Explanation:

The first step when performing triage of a malware incident is to contain the affected system, which means isolating it from the network and preventing any further communication or data transfer with the attacker or other compromised systems. Containing the affected system helps to limit the scope and impact of the incident, preserve the evidence, and prevent the spread of the malware to other systems.

Reference=NIST SP 800-61 Revision 2,CISM Review Manual 15th Edition

An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?

A.
Notify senior management of the issue.
A.
Notify senior management of the issue.
Answers
B.
Report the issue to legal personnel.
B.
Report the issue to legal personnel.
Answers
C.
Initiate contract renegotiation.
C.
Initiate contract renegotiation.
Answers
D.
Assess the extent of the issue.
D.
Assess the extent of the issue.
Answers
Suggested answer: D

Explanation:

The first course of action when the information security manager becomes aware that a third-party provider is not in compliance with the SOW is to assess the extent of the issue, which means determining the nature, scope, and impact of the non-compliance on the security of the enterprise's data and systems. The assessment should also identify the root cause of the non-compliance and the possible remediation actions. The assessment will help the information security manager to decide the next steps, such as notifying senior management, reporting the issue to legal personnel, initiating contract renegotiation, or terminating the contract.

Reference=Ensuring Vendor Compliance and Third-Party Risk Mitigation,A Risk-Based Management Approach to Third-Party Data Security, Risk and Compliance

A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?

A.
Gain an understanding of the current business direction.
A.
Gain an understanding of the current business direction.
Answers
B.
Perform a risk assessment of the current IT environment.
B.
Perform a risk assessment of the current IT environment.
Answers
C.
Inventory and review current security policies.
C.
Inventory and review current security policies.
Answers
D.
Update in accordance with the best business practices.
D.
Update in accordance with the best business practices.
Answers
Suggested answer: C

Which of the following is the PRIMARY responsibility of the information security function when an organization adopts emerging technologies?

A.
Developing security training for the new technologies
A.
Developing security training for the new technologies
Answers
B.
Designing new security controls
B.
Designing new security controls
Answers
C.
Creating an acceptable use policy for the technologies
C.
Creating an acceptable use policy for the technologies
Answers
D.
Assessing the potential security risk
D.
Assessing the potential security risk
Answers
Suggested answer: D

Explanation:

The primary responsibility of the information security function when an organization adopts emerging technologies is to assess the potential security risk, which means identifying and evaluating the threats, vulnerabilities, and impacts that the new technologies may pose to the organization's data, systems, and objectives. Assessing the potential security risk helps the information security function to determine the appropriate security requirements, controls, and measures to mitigate the risk and ensure the safe and secure adoption of the emerging technologies.

Reference=Performing Risk Assessments of Emerging Technologies,CISM Review Manual 15th Edition

Learn more:

1. isaca.org2. isaca.org3. niccs.cisa.gov4. venturebeat.com

10of30

An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk? A. Requirement for regular information security awareness B. Right-to-audit clause C. Service level agreement (SLA) D. Requirement to comply with corporate security policy Answer: (Refer to

An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?

A.
Requirement for regular information security awareness
A.
Requirement for regular information security awareness
Answers
B.
Right-to-audit clause
B.
Right-to-audit clause
Answers
C.
Service level agreement (SLA)
C.
Service level agreement (SLA)
Answers
D.
Requirement to comply with corporate security policy
D.
Requirement to comply with corporate security policy
Answers
Suggested answer: D

Explanation:

The most effective way to mitigate information security risk when outsourcing network management to a service provider is to include a requirement for the service provider to comply with the corporate security policy in the contract. This requirement ensures that the service provider follows the same security standards, procedures, and controls as the organization, and protects the confidentiality, integrity, and availability of the organization's data and systems. The requirement also defines the roles and responsibilities, the reporting and escalation mechanisms, and the penalties for non-compliance.

Reference=A Risk-Based Management Approach to Third-Party Data Security, Risk and Compliance,CISM Domain 2: Information Risk Management (IRM) [2022 update]

Which of the following is the MOST effective way to convey information security responsibilities across an organization?

A.
Implementing security awareness programs
A.
Implementing security awareness programs
Answers
B.
Documenting information security responsibilities within job descriptions
B.
Documenting information security responsibilities within job descriptions
Answers
C.
Developing a skills matrix
C.
Developing a skills matrix
Answers
D.
Defining information security responsibilities in the security policy
D.
Defining information security responsibilities in the security policy
Answers
Suggested answer: B

Explanation:

Documenting information security responsibilities within job descriptions is the most effective way to convey information security responsibilities across an organization because it clearly defines the roles, expectations, and accountabilities of each employee regarding information security. It also helps to align the information security objectives with the business goals and performance indicators, and to ensure compliance with the security policies and standards.

Reference=CISM Review Manual 15th Edition,What is CISM? - Digital Guardian

Total 793 questions
Go to page: of 80