ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 66

Question list
Search
Search

List of questions

Search

Which of the following should have the MOST influence on an organization's response to a new industry regulation?

A.
The organization's control objectives
A.
The organization's control objectives
Answers
B.
The organization's risk management framework
B.
The organization's risk management framework
Answers
C.
The organization's risk appetite
C.
The organization's risk appetite
Answers
D.
The organization's risk control baselines
D.
The organization's risk control baselines
Answers
Suggested answer: C

Explanation:

The most influential factor on an organization's response to a new industry regulation isthe organization's risk appetite. This is because the risk appetite defines the level of risk that the organization is willing to accept in pursuit of its objectives, and it guides the decision-making process for managing risks. The risk appetite also determines the extent to which the organization needs to comply with the new regulation, and the resources and actions required to achieve compliance. The risk appetite should be aligned with the organization's strategy, culture, and values, and it should be communicated and monitored throughout the organization.

An organization is considering using a third party to host sensitive archived data. Which of the following is MOST important to verify before entering into the relationship?

A.
The vendor's data centers are in the same geographic region.
A.
The vendor's data centers are in the same geographic region.
Answers
B.
The encryption keys are not provisled to the vendor.
B.
The encryption keys are not provisled to the vendor.
Answers
C.
The vendor's controls are in line with the organization's security standards.
C.
The vendor's controls are in line with the organization's security standards.
Answers
D.
Independent audits of the vendor's operations are regularly conducted.
D.
Independent audits of the vendor's operations are regularly conducted.
Answers
Suggested answer: C

Explanation:

The most important thing to verify before entering into a relationship with a third party to host sensitive archived data isthe vendor's controls are in line with the organization's security standards. This is because the organization is ultimately responsible for the security and privacy of its data, even if it is stored or processed by a third party. The organization should ensure that the vendor has adequate and effective controls to protect the data from unauthorized access, modification, disclosure, or destruction. The organization should also ensure that the vendor complies with the applicable laws and regulations regarding data protection, such as the General Data Protection Regulation (GDPR) in the European Union. The organization should conduct a thorough risk assessment of the vendor and its services, and establish a clear contract that defines the roles, responsibilities, expectations, and obligations of both parties.

Reference= CISM Review Manual 15th Edition, Chapter 3, Section 3.2.1, page 1341; CISM Review Questions, Answers & Explanations Manual 9th Edition, Question 2, page 2

Which of the following BEST indicates that an information security governance framework has been successfully implemented?

A.
The framework aligns internal and external resources.
A.
The framework aligns internal and external resources.
Answers
B.
The framework aligns security processes with industry best practices.
B.
The framework aligns security processes with industry best practices.
Answers
C.
The framework aligns management and other functions within the security organization.
C.
The framework aligns management and other functions within the security organization.
Answers
D.
The framework includes commercial off-the-shelf security solutions.
D.
The framework includes commercial off-the-shelf security solutions.
Answers
Suggested answer: A

Explanation:

The best indicator that an information security governance framework has been successfully implemented is A. The framework aligns internal and external resources. This is because the framework should ensure that the information security strategy, policies, and objectives are aligned with the business goals, stakeholder expectations, and regulatory requirements. The framework should also enable the effective allocation and coordination of internal and external resources, such as people, processes, technology, and finances, to support the information security program and its activities.

The framework should ensure that the information security strategy, policies, and objectives are aligned with the business goals, stakeholder expectations, and regulatory requirements. The framework should also enable the effective allocation and coordination of internal and external resources, such as people, processes, technology, and finances, to support the information security program and its activities. (From CISM Manual or related resources)

Reference = CISM Review Manual 15th Edition, Chapter 1, Section 1.2.1, page 181; CISM Review Questions, Answers & Explanations Manual 9th Edition, Question 49, page 14

Which of the following is the BEST starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities?

A.
Controls analysis
A.
Controls analysis
Answers
B.
Emerging risk review
B.
Emerging risk review
Answers
C.
Penetration testing
C.
Penetration testing
Answers
D.
Traffic monitoring
D.
Traffic monitoring
Answers
Suggested answer: C

Explanation:

The best starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities is C. Penetration testing. This is because penetration testing is a method of simulating real-world attacks on a network to evaluate its security posture and identify any weaknesses or gaps that could be exploited by malicious actors. Penetration testing can help the information security manager to assess the effectiveness of the existing controls, prioritize the remediation efforts, and demonstrate compliance with the relevant standards and regulations. Penetration testing can also provide valuable insights into the network architecture, configuration, and behavior, as well as the potential impact and likelihood of different types of attacks.

Reference = CISM Review Manual 15th Edition, Chapter 4, Section 4.2.1, page 2091; CISM Review Questions, Answers & Explanations Manual 9th Edition, Question 50, page 14

What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?

A.
Developing a dashboard for communicating the metrics
A.
Developing a dashboard for communicating the metrics
Answers
B.
Agreeing on baseline values for the metrics
B.
Agreeing on baseline values for the metrics
Answers
C.
Benchmarking the expected value of the metrics against industry standards
C.
Benchmarking the expected value of the metrics against industry standards
Answers
D.
Aligning the metrics with the organizational culture
D.
Aligning the metrics with the organizational culture
Answers
Suggested answer: D

Explanation:

The most important consideration when establishing metrics for reporting to the information security strategy committee is D. Aligning the metrics with the organizational culture. This is because the metrics should reflect the values, beliefs, and behaviors of the organization and its stakeholders, and support the achievement of the strategic objectives and goals. The metrics should also be relevant, meaningful, and understandable for the intended audience, and provide clear and actionable information for decision making. The metrics should not be too technical, complex, or ambiguous, but rather focus on the key aspects of information security performance, such as risk, compliance, maturity, value, and effectiveness.

Reference = CISM Review Manual 15th Edition, Chapter 1, Section 1.3.2, page 281; CISM Review Questions, Answers & Explanations Manual 9th Edition, Question 5, page 3

Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?

A.
Service level agreement (SLA)
A.
Service level agreement (SLA)
Answers
B.
Business continuity plan (BCP)
B.
Business continuity plan (BCP)
Answers
C.
Disaster recovery plan (DRP)
C.
Disaster recovery plan (DRP)
Answers
D.
Business impact analysis (BIA)
D.
Business impact analysis (BIA)
Answers
Suggested answer: B

Explanation:

The best option to enable the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption is B. Business continuity plan (BCP). This is because a BCP is a documented collection of procedures and information that guides the organization to prepare for, respond to, and recover from a disruption, such as a natural disaster, a cyberattack, or a pandemic. A BCP aims to ensure the continuity of the critical business functions and processes that support the delivery of products and services to the customers and stakeholders. A BCP also defines the roles, responsibilities, resources, and actions required to maintain the operational resilience of the organization in the face of a disruption.

Reference = CISM Review Manual 15th Edition, Chapter 4, Section 4.2.3, page 2141; CISM Review Questions, Answers & Explanations Manual 9th Edition, Question 6, page 3

An organization is performing due diligence when selecting a third party. Which of the following is MOST helpful to reduce the risk of unauthorized sharing of information during this process?

A.
Using secure communication channels
A.
Using secure communication channels
Answers
B.
Establishing mutual non-disclosure agreements (NDAs)
B.
Establishing mutual non-disclosure agreements (NDAs)
Answers
C.
Requiring third-party privacy policies
C.
Requiring third-party privacy policies
Answers
D.
Obtaining industry references
D.
Obtaining industry references
Answers
Suggested answer: B

Explanation:

The best option to reduce the risk of unauthorized sharing of information during the due diligence process is B. Establishing mutual non-disclosure agreements (NDAs). This is because NDAs are legal contracts that bind the parties to keep confidential any information that is exchanged or disclosed during the due diligence process. NDAs can help to protect the sensitive data, intellectual property, trade secrets, or business strategies of both the organization and the third party from being leaked, stolen, or misused by unauthorized parties. NDAs can also specify the terms and conditions for the use, storage, and disposal of the information, as well as the consequences for breaching the agreement.

Reference = CISM Review Manual 15th Edition, Chapter 3, Section 3.2.1, page 1341; CISM Review Questions, Answers & Explanations Manual 9th Edition, Question 70, page 18

Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?

A.
Record and close security incident tickets.
A.
Record and close security incident tickets.
Answers
B.
Test and verify that compromisedsystems are clean.
B.
Test and verify that compromisedsystems are clean.
Answers
C.
Document recovery steps for senior management reporting.
C.
Document recovery steps for senior management reporting.
Answers
D.
Capture and preserve forensic images of affected systems.
D.
Capture and preserve forensic images of affected systems.
Answers
Suggested answer: B

An information security manager has been asked to provide both one-year and five-year plans for the information security program. What is the PRIMARY purpose for the long-term plan?

A.
To facilitate the continuous improvement of the IT organization
A.
To facilitate the continuous improvement of the IT organization
Answers
B.
To ensure controls align with security needs
B.
To ensure controls align with security needs
Answers
C.
To create and document required IT capabilities
C.
To create and document required IT capabilities
Answers
D.
To prioritize security risks on a longer scale than the one-year plan
D.
To prioritize security risks on a longer scale than the one-year plan
Answers
Suggested answer: B

Explanation:

The primary purpose for the long-term plan for the information security program is to ensure controls align with security needs. This is because the long-term plan provides a strategic vision and direction for the information security program, and defines the goals, objectives, and initiatives that support the organization's mission, vision, and values. The long-term plan also helps to identify and prioritize the security risks and opportunities that may arise in the future, and to align the information security controls with the changing business and technology environment. The long-term plan also facilitates the allocation and optimization of the resources and budget for the information security program, and enables the measurement and evaluation of the program's performance and value.

The long-term plan provides a strategic vision and direction for the information security program, and defines the goals, objectives, and initiatives that support the organization's mission, vision, and values. The long-term plan also helps to identify and prioritize the security risks and opportunities that may arise in the future, and to align the information security controls with the changing business and technology environment. (From CISM Manual or related resources)

Reference = CISM Review Manual 15th Edition, Chapter 3, Section 3.1.1, page 1261; CISM domain 3: Information security program development and management [2022 update] | Infosec2; CISM: Information Security Program Development and Management Part 1 Online, Self-Paced3

Which of the following is MOST important for the improvement of a business continuity plan (BCP)?

A.
Incorporating lessons learned
A.
Incorporating lessons learned
Answers
B.
Implementing an IT resilience solution
B.
Implementing an IT resilience solution
Answers
C.
Implementing management reviews
C.
Implementing management reviews
Answers
D.
Documenting critical business processes
D.
Documenting critical business processes
Answers
Suggested answer: A
Total 793 questions
Go to page: of 80