ExamGecko
Home Home / Isaca / CISM

Isaca CISM Practice Test - Questions Answers, Page 9

Question list
Search
Search

Which of the following is MOST important when conducting a forensic investigation?

A.
Analyzing system memory
A.
Analyzing system memory
Answers
B.
Documenting analysis steps
B.
Documenting analysis steps
Answers
C.
Capturing full system images
C.
Capturing full system images
Answers
D.
Maintaining a chain of custody
D.
Maintaining a chain of custody
Answers
Suggested answer: D

Explanation:

Maintaining a chain of custody is the most important step when conducting a forensic investigation, as this ensures that the evidence is preserved, protected, and documented from the time of collection to the time of presentation in court. A chain of custody provides a record of who handled the evidence, when, where, why, and how, and prevents any tampering, alteration, or loss of the evidence. A chain of custody also establishes the authenticity, reliability, and admissibility of the evidence in legal proceedings.Analyzing system memory, documenting analysis steps, and capturing full system images are also important, but not as important as maintaining a chain of custody, as they do not guarantee the integrity and validity of the evidence.Reference= CISM Review Manual 2023, page 1701; CISM Review Questions, Answers & Explanations Manual 2023, page 332; ISACA CISM - iSecPrep, page 183

Which of the following should be done FIRST when establishing a new data protection program that must comply with applicable data privacy regulations?

A.
Evaluate privacy technologies required for data protection.
A.
Evaluate privacy technologies required for data protection.
Answers
B.
Encrypt all personal data stored on systems and networks.
B.
Encrypt all personal data stored on systems and networks.
Answers
C.
Update disciplinary processes to address privacy violations.
C.
Update disciplinary processes to address privacy violations.
Answers
D.
Create an inventory of systems where personal data is stored.
D.
Create an inventory of systems where personal data is stored.
Answers
Suggested answer: D

Explanation:

= The first step when establishing a new data protection program that must comply with applicable data privacy regulations is to create an inventory of systems where personal data is stored. Personal data is any information that relates to an identified or identifiable natural person, such as name, address, email, phone number, identification number, location data, biometric data, or online identifiers. Data privacy regulations are laws and rules that govern the collection, processing, storage, transfer, and disposal of personal data, and that grant rights and protections to the data subjects, such as the right to access, rectify, erase, or restrict the use of their personal data. Examples of data privacy regulations are the General Data Protection Regulation (GDPR) in the European Union, the California Consumer Privacy Act (CCPA) in the United States, and the Personal Data Protection Act (PDPA) in Singapore. Creating an inventory of systems where personal data is stored is essential for the data protection program, because it helps to:

Identify the sources, types, and locations of personal data that the organization collects and holds, and the purposes and legal bases for which they are used.

Assess the risks and impacts associated with the personal data, and the compliance requirements and obligations under the applicable data privacy regulations.

Implement appropriate technical and organizational measures to protect the personal data from unauthorized or unlawful access, use, disclosure, modification, or loss, such as encryption, pseudonymization, access control, backup, or audit logging.

Establish policies, procedures, and processes to manage the personal data throughout their life cycle, and to respond to the requests and complaints from the data subjects or the data protection authorities.

Monitor and review the performance and effectiveness of the data protection program, and report and resolve any data breaches or incidents.

Reference= CISM Review Manual, 16th Edition, Chapter 3: Information Security Program Development and Management, Section: Data Protection, pages 202-2051; CISM Review Questions, Answers & Explanations Manual, 10th Edition, Question 71, page 662.

Which of the following BEST indicates that information security governance and corporate governance are integrated?

A.
The information security team is aware of business goals.
A.
The information security team is aware of business goals.
Answers
B.
The board is regularly informed of information security key performance indicators (KPIs),
B.
The board is regularly informed of information security key performance indicators (KPIs),
Answers
C.
The information security steering committee is composed of business leaders.
C.
The information security steering committee is composed of business leaders.
Answers
D.
A cost-benefit analysis is conducted on all information security initiatives.
D.
A cost-benefit analysis is conducted on all information security initiatives.
Answers
Suggested answer: C

Explanation:

The information security steering committee is composed of business leaders is the best indicator that information security governance and corporate governance are integrated, as this shows that the information security program is aligned with the business objectives and strategies, and that the information security manager has the support and involvement of the senior management. The information security steering committee is responsible for overseeing the information security program, setting the direction and scope, approving policies and standards, allocating resources, and monitoring performance and compliance. The information security steering committee also ensures that the information security risks are communicated and addressed at the board level, and that the information security program is consistent with the corporate governance framework and culture.The information security team is aware of business goals, the board is regularly informed of information security key performance indicators (KPIs), and a cost-benefit analysis is conducted on all information security initiatives are also important, but not as important as the information security steering committee is composed of business leaders, as they do not necessarily imply that the information security governance and corporate governance are integrated, and that the information security program has the authority and accountability to achieve its goals.Reference= CISM Review Manual 2023, page 271; CISM Review Questions, Answers & Explanations Manual 2023, page 342; ISACA CISM - iSecPrep, page 193

Which of the following should be the PRIMARY objective of the information security incident response process?

A.
Conducting incident triage
A.
Conducting incident triage
Answers
B.
Communicating with internal and external parties
B.
Communicating with internal and external parties
Answers
C.
Minimizing negative impact to critical operations
C.
Minimizing negative impact to critical operations
Answers
D.
Classifying incidents
D.
Classifying incidents
Answers
Suggested answer: C

Explanation:

The primary objective of the information security incident response process is to minimize the negative impact to critical operations. An information security incident is an event that threatens or compromises the confidentiality, integrity, or availability of the organization's information assets or processes. The information security incident response process is a process that defines the roles, responsibilities, procedures, and tools for detecting, analyzing, containing, eradicating, recovering, and learning from information security incidents. The main goal of the information security incident response process is to restore the normal operations as quickly and effectively as possible, and to prevent or reduce the harm or loss caused by the incident to the organization, its stakeholders, or its environment.

Conducting incident triage (A) is an important activity of the information security incident response process, but not the primary objective. Incident triage is the process of prioritizing and assigning the incidents based on their severity, urgency, and impact. Incident triage helps to allocate the appropriate resources, personnel, and time to handle the incidents, and to escalate the incidents to the relevant authorities or parties if needed. However, incident triage is not the ultimate goal of the information security incident response process, but a means to achieve it.

Communicating with internal and external parties (B) is also an important activity of the information security incident response process, but not the primary objective. Communicating with internal and external parties is the process of informing and updating the stakeholders, such as management, employees, customers, partners, regulators, or media, about the incident status, actions, and outcomes. Communicating with internal and external parties helps to maintain the trust, confidence, and reputation of the organization, and to comply with the legal and contractual obligations, such as notification or reporting requirements. However, communicating with internal and external parties is not the ultimate goal of the information security incident response process, but a means to achieve it.

Classifying incidents (D) is also an important activity of the information security incident response process, but not the primary objective. Classifying incidents is the process of categorizing and labeling the incidents based on their type, source, cause, or impact. Classifying incidents helps to identify and understand the nature and scope of the incidents, and to apply the appropriate response procedures and controls. However, classifying incidents is not the ultimate goal of the information security incident response process, but a means to achieve it.

Reference= CISM Review Manual, 16th Edition, Chapter 4: Information Security Incident Management, Section: Incident Response Plan, page 1811

An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?

A.
Red team exercise
A.
Red team exercise
Answers
B.
Black box penetration test
B.
Black box penetration test
Answers
C.
Disaster recovery exercise
C.
Disaster recovery exercise
Answers
D.
Tabletop exercise
D.
Tabletop exercise
Answers
Suggested answer: D

Explanation:

= A tabletop exercise is the best type of exercise for an incident response team at the first drill, as it is a low-cost, low-risk, and high-value method to test and evaluate the incident response plan, procedures, roles, and capabilities. A tabletop exercise is a simulation of a realistic scenario that involves a security incident, and requires the participation and discussion of the incident response team members and other relevant stakeholders. The tabletop exercise allows the incident response team to identify and address the gaps, issues, or challenges in the incident response process, and to improve the communication, coordination, and collaboration among the team members and other parties. The tabletop exercise also helps to enhance the knowledge, skills, and confidence of the incident response team members, and to prepare them for more complex or advanced exercises or real incidents.

A red team exercise (A) is a type of exercise that involves a group of ethical hackers or security experts who act as adversaries and attempt to compromise the organization's security defenses, systems, or processes. A red team exercise is a high-cost, high-risk, and high-value method to test and evaluate the security posture and resilience of the organization, and to identify and exploit the security weaknesses or vulnerabilities. However, a red team exercise is not the best type of exercise for an incident response team at the first drill, as it is more suitable for a mature and experienced team that has already tested and validated the incident response plan, procedures, roles, and capabilities.

A black box penetration test (B) is a type of security testing that simulates a malicious attack on the organization's systems or processes, without any prior knowledge or information about them. A black box penetration test is a high-cost, high-risk, and high-value method to test and evaluate the security posture and resilience of the organization, and to identify and exploit the security weaknesses or vulnerabilities. However, a black box penetration test is not the best type of exercise for an incident response team at the first drill, as it is more suitable for a mature and experienced team that has already tested and validated the incident response plan, procedures, roles, and capabilities.

A disaster recovery exercise is a type of exercise that simulates a catastrophic event that disrupts or destroys the organization's critical systems or processes, and requires the activation and execution of the disaster recovery plan, procedures, roles, and capabilities. A disaster recovery exercise is a high-cost, high-risk, and high-value method to test and evaluate the disaster recovery posture and resilience of the organization, and to identify and address the recovery issues or challenges. However, a disaster recovery exercise is not the best type of exercise for an incident response team at the first drill, as it is more suitable for a mature and experienced team that has already tested and validated the incident response plan, procedures, roles, and capabilities.

Reference= CISM Review Manual, 16th Edition, Chapter 4: Information Security Incident Management, Section: Incident Response Plan, Subsection: Testing and Maintenance, page 184-1851

Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?

A.
Publish adopted information security standards.
A.
Publish adopted information security standards.
Answers
B.
Perform annual information security compliance reviews.
B.
Perform annual information security compliance reviews.
Answers
C.
Implement an information security governance framework.
C.
Implement an information security governance framework.
Answers
D.
Define penalties for information security noncompliance.
D.
Define penalties for information security noncompliance.
Answers
Suggested answer: C

Explanation:

The best way to ensure the organization's security objectives are embedded in business operations is to implement an information security governance framework. An information security governance framework is a set of policies, procedures, standards, guidelines, roles, and responsibilities that define and direct how the organization manages and measures its information security activities. An information security governance framework helps to align the information security strategy with the business strategy and the organizational culture, and to ensure that the information security objectives are consistent with the business objectives and the stakeholder expectations. An information security governance framework also helps to establish the authority, accountability, and communication channels for the information security function, and to provide the necessary resources, tools, and controls to implement and monitor the information security program. By implementing an information security governance framework, the organization can embed the information security objectives in business operations, and ensure that the information security function supports and enables the business processes and functions, rather than hinders or restricts them.

Reference= CISM Review Manual, 16th Edition, Chapter 1: Information Security Governance, Section: Information Security Governance Framework, page 181; CISM Review Questions, Answers & Explanations Manual, 10th Edition, Question 75, page 702.

Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?

A.
Execute a risk treatment plan.
A.
Execute a risk treatment plan.
Answers
B.
Review contracts and statements of work (SOWs) with vendors.
B.
Review contracts and statements of work (SOWs) with vendors.
Answers
C.
Implement data regionalization controls.
C.
Implement data regionalization controls.
Answers
D.
Determine current and desired state of controls.
D.
Determine current and desired state of controls.
Answers
Suggested answer: D

Explanation:

The best way to achieve compliance with new global regulations related to the protection of personal information is to determine the current and desired state of controls, as this helps the information security manager to identify the gaps and requirements for compliance, and to prioritize and implement the necessary actions and measures to meet the regulatory standards. The current state of controls refers to the existing level of protection and compliance of the personal information, while the desired state of controls refers to the target level of protection and compliance that is required by the new regulations. By comparing the current and desired state of controls, the information security manager can assess the maturity and effectiveness of the information security program, and plan and execute a risk treatment plan to address the risks and issues related to the protection of personal information.Executing a risk treatment plan, reviewing contracts and statements of work (SOWs) with vendors, and implementing data regionalization controls are also important, but not as important as determining the current and desired state of controls, as they are dependent on the outcome of the gap analysis and the risk assessment, and may not be sufficient or appropriate to achieve compliance with the new regulations.Reference= CISM Review Manual 2023, page 491; CISM Review Questions, Answers & Explanations Manual 2023, page 352; ISACA CISM - iSecPrep, page 203

Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?

A.
Communicate disciplinary processes for policy violations.
A.
Communicate disciplinary processes for policy violations.
Answers
B.
Require staff to participate in information security awareness training.
B.
Require staff to participate in information security awareness training.
Answers
C.
Require staff to sign confidentiality agreements.
C.
Require staff to sign confidentiality agreements.
Answers
D.
Include information security responsibilities in job descriptions.
D.
Include information security responsibilities in job descriptions.
Answers
Suggested answer: B

Explanation:

The most effective way to help staff members understand their responsibilities for information security is to require them to participate in information security awareness training. Information security awareness training is a program that educates and motivates the staff members about the importance, benefits, and principles of information security, and the roles and responsibilities that they have in protecting the information assets and resources of the organization. Information security awareness training also provides the staff members with the necessary knowledge, skills, and tools to comply with the information security policies, procedures, and standards of the organization, and to prevent, detect, and report any information security incidents or issues. Information security awareness training also helps to create and maintain a positive and proactive information security culture among the staff members, and to increase their confidence and competence in performing their information security duties.

Reference= CISM Review Manual, 16th Edition, Chapter 1: Information Security Governance, Section: Information Security Culture, page 281; CISM Review Manual, 16th Edition, Chapter 3: Information Security Program Development and Management, Section: Information Security Awareness, Training and Education, pages 197-1982.

An online bank identifies a successful network attack in progress. The bank should FIRST:

A.
isolate the affected network segment.
A.
isolate the affected network segment.
Answers
B.
report the root cause to the board of directors.
B.
report the root cause to the board of directors.
Answers
C.
assess whether personally identifiable information (Pll) is compromised.
C.
assess whether personally identifiable information (Pll) is compromised.
Answers
D.
shut down the entire network.
D.
shut down the entire network.
Answers
Suggested answer: A

Explanation:

The online bank should first isolate the affected network segment, as this is the most effective way to contain the attack and prevent it from spreading to other parts of the network or compromising more data or systems. Isolating the affected network segment also helps to preserve the evidence and facilitate the investigation and recovery process.Reporting the root cause to the board of directors, assessing whether personally identifiable information (Pll) is compromised, and shutting down the entire network are not the first actions that the online bank should take, as they may not be feasible or appropriate at the time of the attack, and may cause more disruption, confusion, or damage to the business operations and reputation.Reference= CISM Review Manual 2023, page 1641; CISM Review Questions, Answers & Explanations Manual 2023, page 362; ISACA CISM - iSecPrep, page 213

Which of the following is the BEST approach for governing noncompliance with security requirements?

A.
Base mandatory review and exception approvals on residual risk,
A.
Base mandatory review and exception approvals on residual risk,
Answers
B.
Require users to acknowledge the acceptable use policy.
B.
Require users to acknowledge the acceptable use policy.
Answers
C.
Require the steering committee to review exception requests.
C.
Require the steering committee to review exception requests.
Answers
D.
Base mandatory review and exception approvals on inherent risk.
D.
Base mandatory review and exception approvals on inherent risk.
Answers
Suggested answer: A

Explanation:

= Residual risk is the risk that remains after applying security controls. It reflects the actual exposure of the organization to noncompliance issues. Therefore, basing mandatory review and exception approvals on residual risk is the best approach for governing noncompliance with security requirements. It ensures that the organization is aware of the potential impact and likelihood of noncompliance and can make informed decisions about accepting, mitigating, or transferring the risk.Reference= CISM Review Manual 15th Edition, page 78.

Total 793 questions
Go to page: of 80