ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 65

Question list
Search
Search

An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?

A.
Business impact analysis (BIA)
A.
Business impact analysis (BIA)
Answers
B.
Business continuity plan (BCP)
B.
Business continuity plan (BCP)
Answers
C.
Incident response plan
C.
Incident response plan
Answers
D.
Disaster recovery plan (DRP)
D.
Disaster recovery plan (DRP)
Answers
Suggested answer: B

The PRIMARY objective of timely declaration of a disaster is to:

A.
ensure the continuity of the organization's essential services.
A.
ensure the continuity of the organization's essential services.
Answers
B.
protect critical physical assets from further loss.
B.
protect critical physical assets from further loss.
Answers
C.
assess and correct disaster recovery process deficiencies.
C.
assess and correct disaster recovery process deficiencies.
Answers
D.
ensure engagement of business management in the recovery process.
D.
ensure engagement of business management in the recovery process.
Answers
Suggested answer: A

Explanation:

The primary objective of timely declaration of a disaster is to ensure the continuity of the organization's essential services, as it enables the activation of the business continuity plan (BCP) and the disaster recovery plan (DRP) that outline the processes and procedures to maintain or resume the critical business functions and minimize the impact of the disruption. A timely declaration of a disaster also helps to communicate the situation to the stakeholders, mobilize the resources, and request external assistance if needed.

Reference= CISM Review Manual, 27th Edition, Chapter 4, Section 4.3.1, page 2271; FEMA, How a Disaster Gets Declared2; CISM Online Review Course, Module 4, Lesson 3, Topic 13

Which of the following control types should be considered FIRST for aligning employee behavior with an organization's information security objectives?

A.
Administrative security controls
A.
Administrative security controls
Answers
B.
Technical security controls
B.
Technical security controls
Answers
C.
Physical security controls
C.
Physical security controls
Answers
D.
Access security controls
D.
Access security controls
Answers
Suggested answer: A

A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?

A.
Authority of the subscriber to approve access to its data
A.
Authority of the subscriber to approve access to its data
Answers
B.
Right of the subscriber to conduct onsite audits of the vendor
B.
Right of the subscriber to conduct onsite audits of the vendor
Answers
C.
Commingling of subscribers' data on the same physical server
C.
Commingling of subscribers' data on the same physical server
Answers
D.
Escrow of software code with conditions for code release
D.
Escrow of software code with conditions for code release
Answers
Suggested answer: A

Explanation:

Authority of the subscriber to approve access to its data is the greatest concern for an information security manager if omitted from the contract, as it may expose the subscriber's data to unauthorized or inappropriate access by the vendor or third parties. The subscriber should have the right to control who can access its data, for what purposes, and under what conditions. The contract should also specify the vendor's obligations to protect the confidentiality, integrity, and availability of the subscriber's data, and to notify the subscriber of any breaches or incidents.

Reference= CISM Review Manual, 27th Edition, Chapter 4, Section 4.2.1, page 2201; Drafting and Negotiating Effective Cloud Computing Agreements2; CISM Online Review Course, Module 4, Lesson 2, Topic 13

Which of the following is the BEST course of action when an information security manager identifies that systems are vulnerable to emerging threats?

A.
Frequently update systems and monitor the threat landscape.
A.
Frequently update systems and monitor the threat landscape.
Answers
B.
Monitor the network containing the affected systems for malicious traffic.
B.
Monitor the network containing the affected systems for malicious traffic.
Answers
C.
Increase awareness of the threats among employees who work with the systems.
C.
Increase awareness of the threats among employees who work with the systems.
Answers
D.
Notify senior management and key stakeholders of the threats.
D.
Notify senior management and key stakeholders of the threats.
Answers
Suggested answer: A

Explanation:

The best course of action when an information security manager identifies that systems are vulnerable to emerging threats is to frequently update systems and monitor the threat landscape, as this will help to reduce the exposure and impact of the threats, and enable timely detection and response. Updating systems involves applying patches, fixing vulnerabilities, and implementing security controls. Monitoring the threat landscape involves collecting and analyzing threat intelligence, identifying new attack vectors and techniques, and assessing the risk and impact of the threats.

Reference= CISM Review Manual, 27th Edition, Chapter 4, Section 4.2.1, page 2211; State of Cybersecurity 2023: Navigating Current and Emerging Threats2; CISM Online Review Course, Module 4, Lesson 2, Topic 13

The categorization of incidents is MOST important for evaluating which of the following?

A.
Appropriate communication channels
A.
Appropriate communication channels
Answers
B.
Allocation of needed resources
B.
Allocation of needed resources
Answers
C.
Risk severity and incident priority
C.
Risk severity and incident priority
Answers
D.
Response and containment requirements
D.
Response and containment requirements
Answers
Suggested answer: C

Explanation:

The categorization of incidents is most important for evaluating the risk severity and incident priority, as these factors determine the impact and urgency of the incident, and the appropriate level of response and escalation. The categorization of incidents helps to classify the incidents based on their type, source, cause, scope, and affected assets or services. By categorizing incidents, the information security manager can assess the potential or actual harm to the organization, its stakeholders, and its objectives, and assign a priority level that reflects the need for immediate action and resolution. The risk severity and incident priority also influence the allocation of resources, the response and containment requirements, and the communication channels, but they are not the primary purpose of categorization.

Reference= CISM Review Manual, 27th Edition, Chapter 4, Section 4.4.1, page 2371; CISM Online Review Course, Module 4, Lesson 4, Topic 12; CIRT Case Classification (Draft) - FIRST3

The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:

A.
the internal audit manager.
A.
the internal audit manager.
Answers
B.
the information security officer.
B.
the information security officer.
Answers
C.
the steering committee.
C.
the steering committee.
Answers
D.
the board of directors.
D.
the board of directors.
Answers
Suggested answer: D

Explanation:

The board of directors is the ultimate authority and accountability for ensuring the objectives of an information security framework are being met, as they are responsible for setting the strategic direction, approving the policies, overseeing the performance, and ensuring the compliance of the organization. The board of directors also delegates the authority and resources to the information security officer, the steering committee, and the internal audit manager, who are involved in the design, implementation, monitoring, and improvement of the information security framework.

Reference= CISM Review Manual, 27th Edition, Chapter 4, Section 4.1.1, page 2131; CISM Online Review Course, Module 4, Lesson 1, Topic 12; CISM domain 1: Information security governanceUpdated 2022

Which of the following is a PRIMARY responsibility of the information security goxernance function?

A.
Administering information security awareness training
A.
Administering information security awareness training
Answers
B.
Defining security strategies to support organizational programs
B.
Defining security strategies to support organizational programs
Answers
C.
Ensuring adequate support for solutions using emerging technologies
C.
Ensuring adequate support for solutions using emerging technologies
Answers
D.
Advising senior management on optimal levels of risk appetite and tolerance
D.
Advising senior management on optimal levels of risk appetite and tolerance
Answers
Suggested answer: B

Explanation:

Defining security strategies to support organizational programs is a primary responsibility of the information security governance function, as it involves providing strategic direction for security activities and ensuring that objectives are achieved.According to ISACA, information security governance is a subset of corporate governance that provides guidance for aligning information security with business objectives, managing information security risks, and using information resources responsibly12.

Reference= CISM Review Manual, 27th Edition, Chapter 4, Section 4.1.1, page 2131; CISM Online Review Course, Module 4, Lesson 1, Topic 12

Which of the following is MOST important to include in security incident escalation procedures?

A.
Key objectives of the security program
A.
Key objectives of the security program
Answers
B.
Recovery procedures
B.
Recovery procedures
Answers
C.
Notification criteria
C.
Notification criteria
Answers
D.
Containment procedures
D.
Containment procedures
Answers
Suggested answer: C

Explanation:

The most important thing to include in security incident escalation procedures isnotification criteria. This is because notification criteria define who needs to be informed of an incident, when, and how, depending on the severity, impact, and nature of the incident. Notification criteria help to ensure that the appropriate stakeholders are aware of the incident and can take the necessary actions to respond, mitigate, and recover from it. Notification criteria also help to comply with legal and regulatory requirements for reporting incidents to external parties, such as customers, authorities, or media.

Notification criteria define who needs to be informed of an incident, when, and how, depending on the severity, impact, and nature of the incident. (From CISM Manual or related resources)

Reference= CISM Review Manual 15th Edition, Chapter 4, Section 4.2.2, page 2121; CISM Review Questions, Answers & Explanations Manual 9th Edition, Question 1, page 1

Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?

A.
Removable storage media
A.
Removable storage media
Answers
B.
Disaster recovery plan (DRP)
B.
Disaster recovery plan (DRP)
Answers
C.
Offsite data backups
C.
Offsite data backups
Answers
D.
Encrypted data drives
D.
Encrypted data drives
Answers
Suggested answer: C

Explanation:

The best option to facilitate recovery of data lost as a result of a cybersecurity incident isoffsite data backups. This is because offsite data backups provide a secure and reliable way to restore data that may have been corrupted, deleted, or encrypted by malicious actors. Offsite data backups also reduce the risk of data loss due to physical damage, theft, or natural disasters that may affect the primary data storage location. Offsite data backups should be part of a comprehensive disaster recovery plan (DRP) that defines the roles, responsibilities, procedures, and resources for restoring normal operations after a cyber incident.

Total 793 questions
Go to page: of 80