ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 64

Question list
Search
Search

List of questions

Search

An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?

A.
Benchmark the processes with best practice to identify gaps.
A.
Benchmark the processes with best practice to identify gaps.
Answers
B.
Calculate the return on investment (ROI).
B.
Calculate the return on investment (ROI).
Answers
C.
Provide security awareness training to HR.
C.
Provide security awareness training to HR.
Answers
D.
Assess the business objectives of the processes.
D.
Assess the business objectives of the processes.
Answers
Suggested answer: D

Explanation:

The first step when integrating information security into HR management processes is to assess the business objectives of the processes, which means understanding the purpose, scope, and expected outcomes of the HR functions and activities, and how they relate to the organization's strategy and goals. The assessment will help to identify the information security requirements, risks, and controls that are relevant and applicable to the HR processes, and to align the information security objectives with the business objectives.

Reference=CISM Review Manual 15th Edition,CISM: Overview of domains [updated 2022]

An organization's automated security monitoring tool generates an excessively large amount of falsq positives. Which of the following is the BEST method to optimize the monitoring process?

A.
Report only critical alerts.
A.
Report only critical alerts.
Answers
B.
Change reporting thresholds.
B.
Change reporting thresholds.
Answers
C.
Reconfigure log recording.
C.
Reconfigure log recording.
Answers
D.
Monitor incidents in a specific time frame.
D.
Monitor incidents in a specific time frame.
Answers
Suggested answer: B

Explanation:

Changing reporting thresholds is the best method to optimize the monitoring process when the automated security monitoring tool generates an excessively large amount of false positives. Changing reporting thresholds means adjusting the criteria or parameters that trigger the alerts, such as the severity level, the frequency, the source, or the destination of the events. Changing reporting thresholds can help to reduce the number of false positives, filter out the irrelevant or benign events, and focus on the most critical and suspicious events that require further investigation or response.

Reference=Cybersecurity tool sprawl leading to burnout, false positives: report,Security tools' effectiveness hampered by false positives

A project team member notifies the information security manager of a potential security risk that has not been included in the risk register. Which of the following should the information security manager do FIRST?

A.
Implement compensating controls.
A.
Implement compensating controls.
Answers
B.
Analyze the identified risk.
B.
Analyze the identified risk.
Answers
C.
Prepare a risk mitigation plan.
C.
Prepare a risk mitigation plan.
Answers
D.
Add the risk to the risk register.
D.
Add the risk to the risk register.
Answers
Suggested answer: D

An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?

A.
The total cost of the investment
A.
The total cost of the investment
Answers
B.
The cost and associated risk reduction
B.
The cost and associated risk reduction
Answers
C.
The number and severity of ransomware incidents
C.
The number and severity of ransomware incidents
Answers
D.
Benchmarks of industry peers impacted by ransomware
D.
Benchmarks of industry peers impacted by ransomware
Answers
Suggested answer: B

Explanation:

The most important information to present to senior management when reporting on the performance of the initiative to mitigate risk associated with ransomware is the cost and associated risk reduction, which means showing the value and effectiveness of the technical and administrative controls in terms of reducing the likelihood and impact of ransomware incidents and data extortion, and comparing them with the investment and resources required to implement and maintain them. The cost and associated risk reduction can help senior management to evaluate the return on investment (ROI) and the alignment with the business objectives and risk appetite of the initiative.

Reference=Ransomware Risk Management - NIST,#StopRansomware Guide | CISA

An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?

A.
The information security manager
A.
The information security manager
Answers
B.
The data custodian
B.
The data custodian
Answers
C.
Internal IT audit
C.
Internal IT audit
Answers
D.
The data owner
D.
The data owner
Answers
Suggested answer: B

Explanation:

The data custodian is the person or role who is responsible for enforcing authorized and controlled access to the CRM data, according to the security policies and standards defined by the data owner. The data custodian implements and maintains the technical and operational controls, such as authentication, authorization, encryption, backup, and recovery, to protect the data from unauthorized access, modification, disclosure, or destruction. The data custodian also monitors and reports on the data access activities and incidents.

Reference=Setting Up Access Controls and Permissions in Your CRM,Accountability for Information Security Roles and Responsibilities, Part 1,How to Meet the Shared Responsibility Model with CIS

Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?

A.
Inform the public relations officer.
A.
Inform the public relations officer.
Answers
B.
Monitor the third party's response.
B.
Monitor the third party's response.
Answers
C.
Invoke the incident response plan.
C.
Invoke the incident response plan.
Answers
D.
Inform customers of the breach.
D.
Inform customers of the breach.
Answers
Suggested answer: C

Explanation:

The first course of action when one of the organization's critical third-party providers experiences a data breach is to invoke the incident response plan, which means activating the incident response team and following the predefined procedures and protocols to respond to the breach. Invoking the incident response plan helps to coordinate the communication and collaboration with the third-party provider, assess the scope and impact of the breach, contain and eradicate the threat, recover the affected systems and data, and report and disclose the incident to the relevant stakeholders and authorities.

Reference=Cybersecurity Incident Response Exercise Guidance - ISACA,Plan for third-party cybersecurity incident management

A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?

A.
Inadequate incident response controls
A.
Inadequate incident response controls
Answers
B.
Lack of legal review
B.
Lack of legal review
Answers
C.
Inadequate change control
C.
Inadequate change control
Answers
D.
Lack of quality control
D.
Lack of quality control
Answers
Suggested answer: C

Explanation:

Change control is the process of ensuring that changes to an information system are authorized, tested, documented and implemented in a controlled manner. Inadequate change control can result in deficient technical security controls, such as missing patches, misconfigurations, vulnerabilities or errors in the new application.

Reference= CISM Review Manual, 27th Edition, Chapter 4, Section 4.3.2, page 2291

Which of the following is MOST important when developing an information security strategy?

A.
Engage stakeholders.
A.
Engage stakeholders.
Answers
B.
Assign data ownership.
B.
Assign data ownership.
Answers
C.
Determine information types.
C.
Determine information types.
Answers
D.
Classify information assets.
D.
Classify information assets.
Answers
Suggested answer: A

Explanation:

Engaging stakeholders is the most important step when developing an information security strategy, as it ensures that the strategy is aligned with the business objectives, risks, and needs of the organization. Stakeholders include senior management, business units, IT staff, customers, regulators, and other relevant parties who have an interest or influence on the information security of the organization. By engaging stakeholders, the information security manager can gain their support, input, feedback, and buy-in for the strategy, as well as identify and prioritize the security requirements, expectations, and challenges.

Reference= CISM Review Manual, 27th Edition, Chapter 4, Section 4.1.1, page 2131; CISM Online Review Course, Module 4, Lesson 1, Topic 1

Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?

A.
The organization's risk tolerance
A.
The organization's risk tolerance
Answers
B.
The organization's mission
B.
The organization's mission
Answers
C.
Resource availability
C.
Resource availability
Answers
D.
Incident response team training
D.
Incident response team training
Answers
Suggested answer: A

Explanation:

The organization's risk tolerance is the most important factor to consider when choosing a shared alternate location for computing facilities, as it determines the acceptable level of risk exposure and the required recovery time objective (RTO) for the organization. A shared alternate location is a facility that is used by multiple organizations for disaster recovery purposes, and it may have limited resources, availability, and security. Therefore, the organization must assess its risk tolerance and ensure that the shared alternate location can meet its recovery requirements and protect its information assets.

Reference= CISM Review Manual, 27th Edition, Chapter 4, Section 4.3.2, page 2291; CISM Online Review Course, Module 4, Lesson 3, Topic 22; BCMpedia, Alternate Site3

An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?

A.
Local regulations
A.
Local regulations
Answers
B.
Data backup strategy
B.
Data backup strategy
Answers
C.
Consistency in awareness programs
C.
Consistency in awareness programs
Answers
D.
Organizational reporting structure
D.
Organizational reporting structure
Answers
Suggested answer: A

Explanation:

Local regulations are the main concern for the information security manager when implementing a corporate security policy for managing PII, as different countries or regions may have different legal, regulatory or contractual requirements for the protection, processing, storage and transfer of PII. The information security manager should ensure that the policy complies with the applicable local regulations and respects the rights and preferences of the data subjects. The policy should also address the risks and challenges of cross-border data transfers and the use of cloud services.

Reference= CISM Review Manual, 27th Edition, Chapter 4, Section 4.2.1, page 2191; CISM Online Review Course, Module 4, Lesson 2, Topic 12; Comparitech, PII Compliance: What is it and How to Implement it3

Total 793 questions
Go to page: of 80