ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 67

Question list
Search
Search

List of questions

Search

Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?

A.
Establish an information security steering committee.
A.
Establish an information security steering committee.
Answers
B.
Employ a process-based approach for information asset classification.
B.
Employ a process-based approach for information asset classification.
Answers
C.
Utilize an industry-recognized risk management framework.
C.
Utilize an industry-recognized risk management framework.
Answers
D.
Provide security awareness training to board executives.
D.
Provide security awareness training to board executives.
Answers
Suggested answer: A

Explanation:

The best way to help ensure alignment of the information security program with organizational objectives is A. Establish an information security steering committee. This is because an information security steering committee is a cross-functional group of senior executives and managers who provide strategic direction, oversight, and support for the information security program. An information security steering committee can help to ensure that the information security program is aligned with the organizational objectives by:

Communicating and promoting the vision, mission, and value of information security to the organization and its stakeholders

Defining and approving the information security policies, standards, and procedures

Establishing and monitoring the information security goals, metrics, and performance indicators

Allocating and prioritizing the resources and budget for information security initiatives and projects

Resolving any conflicts or issues that may arise between the information security function and the business units

Reviewing and endorsing the information security risk assessment and treatment plans

Ensuring compliance with the legal, regulatory, and contractual obligations regarding information security

An information security steering committee is a cross-functional group of senior executives and managers who provide strategic direction, oversight, and support for the information security program. (From CISM Manual or related resources)

Reference = CISM Review Manual 15th Edition, Chapter 1, Section 1.2.2, page 20; CISM Review Questions, Answers & Explanations Manual 9th Edition, Question 9, page 3; Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd Edition

When establishing an information security governance framework, it is MOST important for an information security manager to understand:

A.
information security best practices.
A.
information security best practices.
Answers
B.
risk management techniques.
B.
risk management techniques.
Answers
C.
the threat environment.
C.
the threat environment.
Answers
D.
the corporate culture.
D.
the corporate culture.
Answers
Suggested answer: D

An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?

A.
Feedback from the vendor's previous clients
A.
Feedback from the vendor's previous clients
Answers
B.
Alignment of the vendor's business objectives with enterprise security goals
B.
Alignment of the vendor's business objectives with enterprise security goals
Answers
C.
The maturity of the vendor's internal control environment
C.
The maturity of the vendor's internal control environment
Answers
D.
Penetration testing against the vendor's network
D.
Penetration testing against the vendor's network
Answers
Suggested answer: B

Explanation:

The most important thing to include in the vendor selection criteria when procuring security services from a third-party vendor is B. Alignment of the vendor's business objectives with enterprise security goals. This is because the vendor should be able to understand and support the enterprise's security vision, mission, strategy, and policies, and provide services that are consistent and compatible with them. The vendor should also be able to demonstrate how their services add value, reduce risk, and enhance the performance and maturity of the enterprise's information security program. The alignment of the vendor's business objectives with enterprise security goals can help to ensure a successful and long-term partnership, and avoid any conflicts, gaps, or issues that may arise from misalignment or divergence.

The vendor should be able to understand and support the enterprise's security vision, mission, strategy, and policies, and provide services that are consistent and compatible with them. (From CISM Manual or related resources)

Reference = CISM Review Manual 15th Edition, Chapter 3, Section 3.2.1, page 1341; Third-Party Vendor Selection: If Done Right, It's a Win-Win2; Vendor Selection Criteria: Key Factors in Procurement Success3

Which of the following BEST indicates the organizational benefit of an information security solution?

A.
Cost savings the solution brings to the information security department
A.
Cost savings the solution brings to the information security department
Answers
B.
Reduced security training requirements
B.
Reduced security training requirements
Answers
C.
Alignment to security threats and risks
C.
Alignment to security threats and risks
Answers
D.
Costs and benefits of the solution calculated over time
D.
Costs and benefits of the solution calculated over time
Answers
Suggested answer: D

Explanation:

The best option to indicate the organizational benefit of an information security solution is D. Costs and benefits of the solution calculated over time. This is because costs and benefits of the solution calculated over time, also known as the return on security investment (ROSI), can help to measure and demonstrate the value and effectiveness of the information security solution in terms of reducing risks, enhancing performance, and achieving strategic goals. ROSI can also help to justify the allocation and optimization of the resources and budget for the information security solution, and to compare and prioritize different security alternatives. ROSI can be calculated by using various methods and formulas, such as the annualized loss expectancy (ALE), the annualized rate of occurrence (ARO), and the cost-benefit analysis (CBA).

Costs and benefits of the solution calculated over time, also known as the return on security investment (ROSI), can help to measure and demonstrate the value and effectiveness of the information security solution in terms of reducing risks, enhancing performance, and achieving strategic goals. (From CISM Manual or related resources)

Reference = CISM Review Manual 15th Edition, Chapter 3, Section 3.1.3, page 1311; CISM Review Questions, Answers & Explanations Manual 9th Edition, Question 99, page 26; How to Calculate Return on Security Investment (ROSI) - Infosec2

Which of the following is necessary to ensure consistent protection for an organization's information assets?

A.
Classification model
A.
Classification model
Answers
B.
Control assessment
B.
Control assessment
Answers
C.
Data ownership
C.
Data ownership
Answers
D.
Regulatory requirements
D.
Regulatory requirements
Answers
Suggested answer: A

Explanation:

The answer to the question is A. Classification model. This is because a classification model is a system of assigning labels or categories to information assets based on their value, sensitivity, and criticality to the organization. A classification model helps to ensure consistent protection for the organization's information assets by:

Providing a common language and criteria for defining and communicating the security requirements and expectations for the information assets

Enabling the identification and prioritization of the information assets that need the most protection and resources

Facilitating the implementation and enforcement of the appropriate level of security controls and measures for the information assets, based on their classification

Supporting the compliance with the legal, regulatory, and contractual obligations regarding the information assets, such as the General Data Protection Regulation (GDPR) or the Health Insurance Portability and Accountability Act (HIPAA)

A classification model is a system of assigning labels or categories to information assets based on their value, sensitivity, and criticality to the organization. A classification model helps to ensure consistent protection for the organization's information assets by providing a common language and criteria for defining and communicating the security requirements and expectations for the information assets, enabling the identification and prioritization of the information assets that need the most protection and resources, facilitating the implementation and enforcement of the appropriate level of security controls and measures for the information assets, based on their classification, and supporting the compliance with the legal, regulatory, and contractual obligations regarding the information assets. (From CISM Manual or related resources)

Reference = CISM Review Manual 15th Edition, Chapter 2, Section 2.2.1, page 751; CISA Domain 5 - Protection of Information Assets2; CISM domain 3: Information security program development and management [2022 update]3; CISM Domain 2: Information Risk Management (IRM) [2022 update]4

Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?

A.
Alignment with financial reporting
A.
Alignment with financial reporting
Answers
B.
Alignment with business initiatives
B.
Alignment with business initiatives
Answers
C.
Alignment with industry frameworks
C.
Alignment with industry frameworks
Answers
D.
Alignment with risk appetite
D.
Alignment with risk appetite
Answers
Suggested answer: B

Explanation:

Explore

The most important consideration when developing key performance indicators (KPIs) for the information security program is B. Alignment with business initiatives. This is because KPIs are measurable values that demonstrate how effectively the information security program is achieving its objectives and delivering value to the organization. KPIs should be aligned with the business initiatives, such as the strategic goals, the mission, the vision, and the values of the organization, and support the achievement of the desired outcomes and benefits. KPIs should also reflect the needs, expectations, and challenges of the business stakeholders, and provide relevant, meaningful, and actionable information for decision making and improvement. KPIs should not be too technical, complex, or ambiguous, but rather focus on the key aspects of information security performance, such as risk, compliance, maturity, value, and effectiveness.

KPIs are measurable values that demonstrate how effectively the information security program is achieving its objectives and delivering value to the organization. KPIs should be aligned with the business initiatives, such as the strategic goals, the mission, the vision, and the values of the organization, and support the achievement of the desired outcomes and benefits. (From CISM Manual or related resources)

Reference = CISM Review Manual 15th Edition, Chapter 1, Section 1.3.2, page 281; CISM Domain -- Information Security Program Development | Infosec2; KPIs in Information Security: The 10 Most Important Security Metrics3

Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?

A.
Disaster recovery plan (DRP)
A.
Disaster recovery plan (DRP)
Answers
B.
Incident notification plan
B.
Incident notification plan
Answers
C.
Risk response scenarios
C.
Risk response scenarios
Answers
D.
Security procedures
D.
Security procedures
Answers
Suggested answer: C

Explanation:

The answer to the question is C. Risk response scenarios. This is because risk response scenarios are the predefined plans and actions that the organization will take to respond to specific types of incidents, such as cyberattacks, natural disasters, or data breaches. Risk response scenarios should be aligned with the corporate strategy, which defines the vision, mission, goals, and objectives of the organization, and guides the decision-making and resource allocation processes. By aligning the risk response scenarios with the corporate strategy, the organization can ensure that the incident response plan supports the achievement of the desired outcomes and benefits, and minimizes the impact and disruption to the business operations and performance.

Risk response scenarios are the predefined plans and actions that the organization will take to respond to specific types of incidents. Risk response scenarios should be aligned with the corporate strategy, which defines the vision, mission, goals, and objectives of the organization. (From CISM Manual or related resources)

Reference = CISM Review Manual 15th Edition, Chapter 4, Section 4.2.2, page 2111; CISM domain 4: Information security incident management [2022 update] | Infosec2; A Guide to Effective Incident Management Communications3

Which of the following is the PRIMARY advantage of an organization using Disaster Recovery as a Service (DRaaS) to help manage its disaster recovery program?

A.
It offers the organization flexible deployment options using cloud infrastructure.
A.
It offers the organization flexible deployment options using cloud infrastructure.
Answers
B.
It allows the organization to prioritize its core operations.
B.
It allows the organization to prioritize its core operations.
Answers
C.
It is more secure than traditional data backup architecture.
C.
It is more secure than traditional data backup architecture.
Answers
D.
It allows the use of a professional response team at a lower cost.
D.
It allows the use of a professional response team at a lower cost.
Answers
Suggested answer: B

Explanation:

The primary advantage of an organization using Disaster Recovery as a Service (DRaaS) to help manage its disaster recovery program isB. It allows the organization to prioritize its core operations.This is because DRaaS is a cloud computing service model that allows an organization to back up its data and IT infrastructure in a third-party cloud computing environment and provide all the disaster recovery orchestration, all through a SaaS solution, to regain access and functionality to IT infrastructure after a disaster1. DRaaS can help the organization to prioritize its core operations by:

Reducing the need for provisioning and maintaining its own off-site disaster recovery environment, which can be costly, complex, and resource-intensive12

Enabling the organization to continue running its applications from the service provider's cloud or hybrid cloud environment instead of from the disaster-affected physical servers, which can minimize the downtime, data loss, and business disruption12

Providing the organization with flexible and scalable deployment options, such as on-demand, pay-per-use, or subscription-based models, that can meet its changing business needs and budget12

Leveraging the expertise, experience, and best practices of the service provider, who can handle the disaster recovery planning, testing, and execution, and ensure compliance with the relevant standards and regulations12

DRaaS is a cloud computing service model that allows an organization to back up its data and IT infrastructure in a third-party cloud computing environment and provide all the disaster recovery orchestration, all through a SaaS solution, to regain access and functionality to IT infrastructure after a disaster. DRaaS can help the organization to prioritize its core operations by reducing the need for provisioning and maintaining its own off-site disaster recovery environment, enabling the organization to continue running its applications from the service provider's cloud or hybrid cloud environment, providing the organization with flexible and scalable deployment options, and leveraging the expertise, experience, and best practices of the service provider. (From CISM Manual or related resources)

Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?

A.
Impose state limits on servers.
A.
Impose state limits on servers.
Answers
B.
Spread a site across multiple ISPs.
B.
Spread a site across multiple ISPs.
Answers
C.
Block the attack at the source.
C.
Block the attack at the source.
Answers
D.
Harden network security.
D.
Harden network security.
Answers
Suggested answer: B

Explanation:

The answer to the question is B. Spread a site across multiple ISPs. This is because spreading a site across multiple Internet service providers (ISPs) can help to reduce the impact of a distributed denial of service (DDoS) attack by increasing the bandwidth and redundancy of the site, and making it harder for the attacker to target and overwhelm a single point of failure. Spreading a site across multiple ISPs can also help to distribute the traffic load and balance the performance of the site, and to mitigate the effects of regional or network-specific outages or disruptions. Spreading a site across multiple ISPs can be done by using various techniques, such as anycast routing, content delivery networks (CDNs), or cloud-based services12.

Spreading a site across multiple ISPs can help to reduce the impact of a DDoS attack by increasing the bandwidth and redundancy of the site, and making it harder for the attacker to target and overwhelm a single point of failure. (From CISM Manual or related resources)

Reference = CISM Review Manual 15th Edition, Chapter 4, Section 4.2.1, page 2091; DDoS Attacks---A Cyberthreat and Possible Solutions2

Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?

A.
Heightened awareness of information security strategies
A.
Heightened awareness of information security strategies
Answers
B.
Improved process resiliency in the event of attacks
B.
Improved process resiliency in the event of attacks
Answers
C.
Promotion of security-by-design principles to the business
C.
Promotion of security-by-design principles to the business
Answers
D.
Management accountability for information security
D.
Management accountability for information security
Answers
Suggested answer: D

Explanation:

The greatest benefit of incorporating information security governance into the corporate governance framework is D. Management accountability for information security. This is because management accountability for information security means that the senior management and the board of directors are responsible for defining, overseeing, and supporting the information security strategy, policies, and objectives of the organization, and ensuring that they are aligned with the business goals, stakeholder expectations, and regulatory requirements. Management accountability for information security also means that the senior management and the board of directors are accountable for the performance, value, and effectiveness of the information security program, and for the management and mitigation of the information security risks and incidents. Management accountability for information security can help to foster a culture of security awareness and responsibility, and to enhance the trust and confidence of the customers, partners, and regulators in the organization's information security capabilities.

Management accountability for information security means that the senior management and the board of directors are responsible for defining, overseeing, and supporting the information security strategy, policies, and objectives of the organization, and ensuring that they are aligned with the business goals, stakeholder expectations, and regulatory requirements. (From CISM Manual or related resources)

Reference = CISM Review Manual 15th Edition, Chapter 1, Section 1.2.1, page 181; CISM domain 1: Information security governance [Updated 2022] | Infosec2; Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd Edition3

Total 793 questions
Go to page: of 80