Isaca: Exam Questions CISM
Isaca: Exam Questions CISM
Get the Full CISM dumps in VCE and PDF From SurePassExam
https://www.surepassexam.com/CISM-exam-dumps.html ( New Questions)
Isaca
Exam Questions CISM
Certified Information Security Manager
NEW QUESTION 1
Information security governance is PRIMARILY driven by:
A. technology constraint
B. regulatory requirement
C. litigation potentia
D. business strateg
Answer: D
Explanation:
Governance is directly tied to the strategy and direction of the business. Technology constraints, regulatory requirements and litigation potential are all important
factors, but they are necessarily in line with the business strategy.
NEW QUESTION 2
To justify its ongoing security budget, which of the following would be of MOST use to the information security' department?
Answer: C
Explanation:
Cost-benefit analysis is the legitimate way to justify budget. The frequency of security breaches may assist the argument for budget but is not the key tool; it does
not address the impact. Annualized loss expectancy (ALE) does not address the potential benefit of security investment. Peer group comparison would provide a
good estimate for the necessary security budget but it would not take into account the specific needs of the organization.
NEW QUESTION 3
Which of the following individuals would be in the BEST position to sponsor the creation of an information security steering group?
Answer: B
Explanation:
The chief operating officer (COO) is highly-placed within an organization and has the most knowledge of business operations and objectives. The chief internal
auditor and chief legal counsel are appropriate members of such a steering group. However, sponsoring the creation of the steering committee should be initiated
by someone versed in the strategy and direction of the business. Since a security manager is looking to this group for direction, they are not in the best position to
oversee formation of this group.
NEW QUESTION 4
It is important to classify and determine relative sensitivity of assets to ensure that:
Answer: D
Explanation:
Classification of assets needs to be undertaken to determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures
can be effectively implemented. While higher costs are allowable to protect sensitive assets, and it is always reasonable to minimize the costs of controls, it is most
important that the controls and countermeasures are commensurate to the risk since this will justify the costs. Choice B is important but it is an incomplete answer
because it does not factor in risk. Therefore, choice D is the most important.
NEW QUESTION 5
There is a time lag between the time when a security vulnerability is first published, and the time when a patch is delivered. Which of the following should be
carried out FIRST to mitigate the risk during this time period?
Answer: A
Explanation:
The best protection is to identify the vulnerable systems and apply compensating controls until a patch is installed. Minimizing the use of vulnerable systems and
communicating the vulnerability to system users could be compensating controls but would not be the first course of action. Choice D does not make clear the
timing of when the intrusion detection system (IDS) signature list would be updated to accommodate the vulnerabilities that are not yet publicly known. Therefore,
this approach should not always be considered as the first option.
NEW QUESTION 6
An information security organization should PRIMARILY:
A. support the business objectives of the company by providing security-related support service
B. be responsible for setting up and documenting the information security responsibilities of the information security team member
C. ensure that the information security policies of the company are in line with global best practices and standard
D. ensure that the information security expectations are conveyed to employee
Answer: A
Explanation:
The information security organization is responsible for options B and D within an organization, but they are not its primary mission. Reviewing and adopting
appropriate standards (option C) is a requirement. The primary objective of an information security organization is to ensure that security supports the overall
business objectives of the company.
NEW QUESTION 7
An outsource service provider must handle sensitive customer information. Which of the following is MOST important for an information security manager to know?
Answer: A
Explanation:
Mow the outsourcer protects the storage and transmission of sensitive information will allow an information security manager to understand how sensitive data will
be protected. Choice B is an important but secondary consideration. Choice C is incorrect because security technologies are not the only components to protect
the sensitive customer information. Choice D is incorrect because an independent security review may not include analysis on how sensitive customer information
would be protected.
NEW QUESTION 8
Which of the following is a key area of the ISO 27001 framework?
Answer: D
Explanation:
Operational risk assessment, financial crime metrics and capacity management can complement the information security framework, but only business continuity
management is a key component.
NEW QUESTION 9
Which of the following is the BEST method for ensuring that security procedures and guidelines are known and understood?
Answer: C
Explanation:
Using computer-based training (CBT) presentations with end-of-section reviews provides feedback on how well users understand what has been presented.
Periodic compliance reviews are a good tool to identify problem areas but do not ensure that procedures are known or understood. Eocus groups may or may not
provide meaningful detail. Although a signed employee acknowledgement is good, it does not indicate whether the material has been read and/or understood.
NEW QUESTION 10
Security awareness training is MOST likely to lead to which of the following?
Answer: B
Explanation:
Reported incidents will provide an indicator as to the awareness level of staff. An increase in reported incidents could indicate that staff is paying more attention to
security. Intrusion incidents and access rule violations may or may not have anything to do with awareness levels. A decrease in changes to security policies may
or may not correlate to security awareness training.
NEW QUESTION 11
An organization's information security manager has been asked to hire a consultant to help assess the maturity level of the organization's information security
management. The MOST important element of the request for proposal (RI P) is the:
Answer: D
Explanation:
Methodology illustrates the process and formulates the basis to align expectations and the execution of the assessment. This also provides a picture of what is
required of all parties involved in the assessment. References from other organizations are important, but not as important as the methodology used in the
assessment. Past experience of the engagement team is not as important as the methodology used. Sample deliverables only tell how the assessment is
presented, not the process.
NEW QUESTION 12
Which of the following areas is MOST susceptible to the introduction of security weaknesses?
A. Database management
B. Tape backup management
C. Configuration management
D. Incident response management
Answer: C
Explanation:
Configuration management provides the greatest likelihood of security weaknesses through misconfiguration and failure to update operating system (OS) code
correctly and on a timely basis.
NEW QUESTION 13
Which of the following is the MOST critical activity to ensure the ongoing security of outsourced IT services?
Answer: B
Explanation:
Regular security audits and reviews of the practices of the provider to prevent potential information security damage will help verify the security of outsourced
services. Depending on the type of services outsourced, security awareness may not be necessary. Security requirements should be included in the contract, but
what is most important is verifying that the requirements are met by the provider. It is not necessary to require the provider to fully comply with the policy if only
some of the policy is related and applicable.
NEW QUESTION 14
Which of the following will BEST ensure that management takes ownership of the decision making process for information security?
Answer: C
Explanation:
Security steering committees provide a forum for management to express its opinion and take ownership in the decision making process. Security awareness
campaigns, security policies and procedures, and self- assessment exercises are all good but do not exemplify the taking of ownership by management.
NEW QUESTION 15
An organization has implemented an enterprise resource planning (ERP) system used by 500 employees from various departments. Which of the following access
A. Rule-based
B. Mandatory
C. Discretionary
D. Role-based
Answer: D
Explanation:
Role-based access control is effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users
are assigned to the various roles and the system controls the access based on those roles. Rule-based access control needs to define the access rules, which is
troublesome and error prone in large organizations. In mandatory access control, the individual's access to information resources needs to be defined, which is
troublesome in large organizations. In discretionary access control, users have access to resources based on predefined sets of principles, which is an inherently
insecure approach.
NEW QUESTION 16
What is the MOST cost-effective method of identifying new vendor vulnerabilities?
Answer: A
Explanation:
External vulnerability sources are going to be the most cost-effective method of identifying these vulnerabilities. The cost involved in choices B and C would be
much higher, especially if performed at regular intervals. Honeypots would not identify all vendor vulnerabilities. In addition, honeypots located in the DMZ can
create a security risk if the production network is not well protected from traffic from compromised honey pots.
NEW QUESTION 17
An information security manager reviewing firewall rules will be MOST concerned if the firewall allows:
A. source routin
B. broadcast propagatio
C. unregistered port
D. nonstandard protocol
Answer: A
Explanation:
If the firewall allows source routing, any outsider can carry out spoofing attacks by stealing the internal (private) IP addresses of the organization. Broadcast
propagation, unregistered ports and nonstandard protocols do not create a significant security exposure.
NEW QUESTION 18
The PRIMARY objective of security awareness is to:
Answer: B
Explanation:
It is most important that security-conscious behavior be encouraged among employees through training that influences expected responses to security incidents.
Ensuring that policies are read and understood, giving employees fair warning of potential disciplinary action, or meeting legal and regulatory requirements is
important but secondary.
NEW QUESTION 19
To determine how a security breach occurred on the corporate network, a security manager looks at the logs of various devices. Which of the following BEST
facilitates the correlation and review of these logs?
A. Database server
B. Domain name server (DNS)
C. Time server
D. Proxy server
Answer: C
Explanation:
To accurately reconstruct the course of events, a time reference is needed and that is provided by the time server. The other choices would not assist in the
NEW QUESTION 20
An unauthorized user gained access to a merchant's database server and customer credit card information. Which of the following would be the FIRST step to
preserve and protect unauthorized intrusion activities?
Answer: C
Explanation:
Isolating the server will prevent further intrusions and protect evidence of intrusion activities left in memory and on the hard drive. Some intrusion activities left in
virtual memory may be lost if the system is shut down. Duplicating the hard disk will only preserve the evidence on the hard disk, not the evidence in virtual
memory, and will not prevent further unauthorized access attempts. Copying the database log file to a protected server will not provide sufficient evidence should
the organization choose to pursue legal recourse.
NEW QUESTION 21
......
* CISM Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* CISM Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year