2 Flashcards

1
Q
  1. When performing a business impact analysis (BIA), who should calculate the recovery time and cost
    estimates?

A. Business process owner
B. Business continuity coordinator
C. Senior management
D. Information security manager

A

Answer: A

Explanation: The business process owner is the person who is responsible for overseeing and managing
the business processes and functions that are essential for the organization’s operations and objectives.
The business process owner has the most direct and detailed knowledge of the inputs, outputs,
dependencies, resources, and performance indicators of the business processes and functions. Therefore,
the business process owner is the best person to calculate the recovery time and cost estimates when
performing a business impact analysis (BIA), which is a process of identifying and quantifying the potential
losses, damages, or consequences that could result from a disruption or an incident that affects the
availability, integrity, or confidentiality of the information assets and systems that support the business
processes and functions. The recovery time and cost estimates are the measures that indicate the time and
money that are needed to resume and restore the normal business operations and functions after the
disruption or incident. The recovery time and cost estimates can help to prioritize and protect the critical
activities and resources, to allocate the appropriate budget and resources, to implement the necessary
controls and measures, and to evaluate the effectiveness and efficiency of the business continuity and
disaster recovery plans.
The business continuity coordinator, the senior management, and the information security manager are all
important roles in the BIA process, but they are not the best ones to calculate the recovery time and cost
estimates. The business continuity coordinator is the person who is responsible for coordinating and
facilitating the BIA process, as well as the development, implementation, and maintenance of the business
continuity and disaster recovery plans. The business continuity coordinator can help to define and
communicate the scope, objectives, and methodology of the BIA, to collect and analyze the data and
information from the business process owners and other stakeholders, to report and present the BIA results
and recommendations, and to provide feedback and suggestions for improvement and optimization of the
BIA and the plans. The senior management is the group of people who have the ultimate authority and
accountability for the organization’s strategy, direction, and performance. The senior management can help
to approve and support the BIA process and the plans, to provide the strategic guidance and vision for the
business continuity and disaster recovery, to allocate the necessary budget and resources, to oversee and
monitor the BIA and the plans, and to make the final decisions and approvals. The information security
manager is the person who is responsible for ensuring the security of the information assets and systems
that support the business processes and functions. The information security manager can help to identify
and assess the information security risks and issues that could affect the BIA and the plans, to implement
and manage the security controls and measures that are needed to protect and recover the information
assets and systems, to coordinate and collaborate with the business process owners and other
stakeholders on the security aspects of the BIA and the plans, and to provide the security expertise and
advice. References = CISM Review Manual 15th Edition, pages 228-2291; CISM Practice Quiz, question
1722

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following is the GREATEST value provided by a security information and event management
    (SIEM) system?

A. Maintaining a repository base of security policies
B. Measuring impact of exploits on business processes
C. Facilitating the monitoring of risk occurrences
D. Redirecting event logs to an alternate location for business continuity plan

A

Answer: C

Explanation: A security information and event management (SIEM) system is a tool that collects, analyzes,
and correlates security events from various sources, such as firewalls, intrusion detection systems,
antivirus software, and other devices. A SIEM system can provide real-time alerts, dashboards, reports,
and forensic analysis of security incidents. The greatest value of a SIEM system is that it can facilitate the
monitoring of risk occurrences by identifying anomalies, trends, patterns, and indicators of compromise that
may otherwise go unnoticed. A SIEM system can also help with incident response, compliance, and audit
activities by providing evidence and documentation of security events.
References =
✑ ISACA, CISM Review Manual, 16th Edition, 2020, page 2291
✑ ISACA, CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, 2020,
question ID 2082
The greatest value provided by a Security Information and Event Management (SIEM) system is facilitating
the monitoring of risk occurrences. SIEM systems collect, analyze and alert on security-related data from
various sources such as firewall logs, intrusion detection/prevention systems, and system logs. This allows
organizations to identify security threats in real-time and respond quickly, helping to mitigate potential harm
to their systems and dat
A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which of the following BEST facilitates an information security manager’s efforts to obtain senior
    management commitment for an information security program?

A. Presenting evidence of inherent risk
B. Reporting the security maturity level
C. Presenting compliance requirements
D. Communicating the residual risk

A

Answer: D

Explanation: Communicating the residual risk is the best way to facilitate an information security manager’s
efforts to obtain senior management commitment for an information security program. The residual risk is
the level of risk that remains after applying the security controls and mitigation measures. The residual risk
reflects the effectiveness and efficiency of the information security program, as well as the potential impact
and exposure of the organization. The information security manager should communicate the residual risk
to the senior management in a clear, concise, and relevant manner, using quantitative or qualitative
methods, such as risk matrices, heat maps, dashboards, or reports. The communication of the residual risk
should also include the comparison with the inherent risk, which is the level of risk before applying any
security controls, and the risk appetite, which is the level of risk that the organization is willing to accept.
The communication of the residual risk should help the senior management to understand the value and
performance of the information security program, as well as the need and justification for further investment
or improvement. Presenting evidence of inherent risk, reporting the security maturity level, and presenting
compliance requirements are all important aspects of the information security program, but they are not the
best ways to obtain senior management commitment. These aspects may not directly demonstrate the
benefits or outcomes of the information security program, or they may not align with the business objectives
or priorities of the organization. For example, presenting evidence of inherent risk may show the potential
threats and vulnerabilities that the organization faces, but it may not indicate how the information security
program addresses or reduces them. Reporting the security maturity level may show the progress and
status of the information security program, but it may not relate to the risk level or the business impact.
Presenting compliance requirements may show the legal or regulatory obligations that the organization
must fulfill, but it may not reflect the actual security needs or goals of the organization. Therefore,
communicating the residual risk is the best way to obtain senior management commitment for an
information security program, as it shows the results and value of the information security program for the
organization. References = CISM Review Manual 2023, page 41 1; CISM Practice Quiz 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. To confirm that a third-party provider complies with an organization’s information security requirements, it is
    MOST important to ensure:

A. security metrics are included in the service level agreement (SLA).
B. contract clauses comply with the organization’s information security policy.
C. the information security policy of the third-party service provider is reviewed.
D. right to audit is included in the service level agreement (SLA).

A

Answer: D

Explanation: = To confirm that a third-party provider complies with an organization’s information security
requirements, it is most important to ensure that the right to audit is included in the service level agreement
(SLA), which is a contract that defines the scope, quality, and terms of the services that the third-party
provider delivers to the organization. The right to audit is a clause that grants the organization the authority
and opportunity to inspect and verify the third-party provider’s security policies, procedures, controls, and
performance, either by itself or by an independent auditor, at any time during the contract period or after a
security incident. The right to audit can help to ensure that the third-party provider adheres to the
organization’s information security requirements, as well as to the legal and regulatory standards and
obligations, and that the organization can monitor and measure the security risks and issues that arise from
the outsourcing relationship. The right to audit can also help to identify and address any gaps, weaknesses,
or errors that could compromise the security of the information assets and systems that are shared, stored,
or processed by the third-party provider, and to provide feedback and recommendations for improvement
and optimization of the security posture and performance.
Security metrics, contract clauses, and the information security policy of the third-party provider are all
important elements of ensuring the compliance of the third-party provider with the organization’s
information security requirements, but they are not the most important ones. Security metrics are
quantitative and qualitative measures that indicate the effectiveness and efficiency of the security controls
and processes that the third-party provider implements and reports to the organization, such as the number
of security incidents, the time to resolve them, the level of customer satisfaction, or the compliance rate.
Security metrics can help to evaluate and compare the security performance and outcomes of the
third-party provider, as well as to identify and address any deviations or discrepancies from the expected or
agreed levels. Contract clauses are legal and contractual terms and conditions that bind the third-party
provider to the organization’s information security requirements, such as the confidentiality, integrity, and
availability of the information assets and systems, the roles and responsibilities of the parties, the liabilities
and penalties for breach or violation, or the dispute resolution mechanisms. Contract clauses can help to
enforce and protect the organization’s information security interests and rights, as well as to prevent or
resolve any conflicts or issues that arise from the outsourcing relationship. The information security policy
of the third-party provider is a document that defines and communicates the third-party provider’s security
vision, mission, objectives, and principles, as well as the security roles, responsibilities, and rules that apply
to the third-party provider’s staff, customers, and partners. The information security policy of the third-party
provider can help to ensure that the third-party provider has a clear and consistent security direction and
guidance, as well as to align and integrate the third-party provider’s security practices and culture with the
organization’s security expectations and requirements. References = CISM Review Manual 15th Edition,
pages 57-581; CISM Practice Quiz, question 1662

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. An information security manager has been notified about a compromised endpoint device Which of the
    following is the BEST course of action to prevent further damage?

A. Wipe and reset the endpoint device.
B. Isolate the endpoint device.
C. Power off the endpoint device.
D. Run a virus scan on the endpoint device.

A

Answer: B

Explanation: A compromised endpoint device is a potential threat to the security of the network and the data
stored on it. The best course of action to prevent further damage is to isolate the endpoint device from the
network and other devices, so that the attacker cannot access or spread to other systems. Isolating the
endpoint device also allows the information security manager to investigate the incident and determine the
root cause, the extent of the compromise, and the appropriate remediation steps. Wiping and resetting the
endpoint device may not be feasible or desirable, as it may result in data loss or evidence destruction.
Powering off the endpoint device may not stop the attack, as the attacker may have installed persistent
malware or backdoors that can resume once the device is powered on again. Running a virus scan on the
endpoint device may not be effective, as the attacker may have used sophisticated techniques to evade
detection or disable the antivirus software. References = CISM Review Manual, 15th Edition, page 1741;
CISM Review Questions, Answers & Explanations Database, question ID 2112; Using EDR to Address
Unmanaged Devices - ISACA3; Boosting Cyberresilience for Critical Enterprise IT Systems With COBIT
and NIST Cybersecurity Frameworks - ISACA; Endpoint Security: On the Frontline of Cyber Risk.
The best way to reduce the risk associated with a bring your own device (BYOD) program is to implement a
mobile device policy and standard. This policy should include guidelines and rules regarding the use of
mobile devices, such as acceptable use guidelines and restrictions on the types of data that can be stored
or accessed on the device. Additionally, it should also include requirements for secure mobile device
practices, such as the use of strong passwords, encryption, and regular patching. A mobile device
management (MDM) solution can also be implemented to help ensure mobile devices meet the
organizational security requirements. However, it is not enough to simply implement the policy and MDM
solution; employees must also be trained on the secure mobile device practices to ensure the policy is
followed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. To overcome the perception that security is a hindrance to business activities, it is important for an
    information security manager to:

A. rely on senior management to enforce security.
B. promote the relevance and contribution of security.
C. focus on compliance.
D. reiterate the necessity of security.

A

Answer: B

Explanation: To overcome the perception that security is a hindrance to business activities, it is important
for an information security manager to promote the relevance and contribution of security to the
organization’s goals and objectives. Security is not only a technical function, but also a business enabler
that supports the organization’s strategy, vision, and mission. By promoting the relevance and contribution
of security, the information security manager can demonstrate the value and benefits of security to the
stakeholders, such as increasing customer trust, enhancing reputation, reducing costs, improving efficiency,
and complying with regulations. Promoting the relevance and contribution of security can also help the
information security manager to build relationships and partnerships with the business units, and to align
the security program with the business needs and expectations. Promoting the relevance and contribution
of security can also help the information security manager to foster a positive security culture and
awareness within the organization, and to encourage the adoption and support of security policies and
practices.
The other options are not the best ways to overcome the perception that security is a hindrance to business
activities. Relying on senior management to enforce security is not the best way, because it may create a
sense of coercion and resentment among the employees, and may undermine the credibility and authority
of the information security manager. Focusing on compliance is not the best way, because it may create a
false sense of security and satisfaction, and may neglect the other aspects and dimensions of security,
such as risk management, value creation, and innovation. Reiterating the necessity of security is not the
best way, because it may not address the root causes and factors of the negative perception, and may not
provide sufficient evidence and justification for the security investments and decisions. References = CISM
Review Manual, 16th Edition, ISACA, 2020, pp. 13-14, 23-241; CISM Online Review Course, Domain 1:
Information Security Governance, Module 1: Information Security Governance Overview, ISACA2
To overcome the perception that security is a hindrance to business activities, it is important for an
information security manager to promote the relevance and contribution of security. By demonstrating the
value that security brings to the organization, including protecting assets and supporting business
objectives, the information security manager can help to change the perception of security from a hindrance
to a critical component of business success.
Relying on senior management to enforce security, focusing on compliance, and reiterating the necessity of
security are all important elements of a comprehensive security program, but they do not directly address
the perception that security is a hindrance to business activities. By promoting the relevance and
contribution of security, the information security manager can help to align security with the overall goals
and objectives of the organization, and foster a culture that values and supports security initiatives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which of the following should be the FIRST step in developing an information security strategy?

A. Determine acceptable levels of information security risk
B. Create a roadmap to identify security baselines and controls
C. Perform a gap analysis based on the current state
D. Identify key stakeholders to champion information security

A

Answer: D

Explanation: The first step in developing an information security strategy is to identify key stakeholders who
can provide support, guidance and resources for information security initiatives. These stakeholders may
include senior management, business unit leaders, legal counsel, audit and compliance officers and other
relevant parties. By engaging these stakeholders early on, an information security manager can ensure that
the strategy aligns with business objectives and expectations, as well as gain buy-in and commitment from
them. Determining acceptable levels of risk, creating a roadmap and performing a gap
analysis are all important steps in developing an information security strategy, but they should follow after
identifying key stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following is the BEST method to ensure compliance with password standards?

A. Implementing password-synchronization software
B. Using password-cracking software
C. Automated enforcement of password syntax rules
D. A user-awareness program

A

Answer: C

Explanation:
Automated enforcement of password syntax rules is the best method to ensure compliance with password
standards. Password syntax rules define the minimum and maximum length, character types, and
construction of passwords. By enforcing these rules automatically, the system can prevent users from
creating or using weak or insecure passwords that do not meet the standards. According to NIST,
password syntax rules should allow at least 8 characters and up to 64 characters, accept all printable ASCII
characters and Unicode characters, and encourage the use of long passphrases1. The other options are
not methods to ensure compliance with password standards, but rather methods to verify or improve
password security. Implementing password-synchronization software can help users manage multiple
passwords across different systems, but it does not ensure that the passwords comply with the standards2.
Using password-cracking software can help test the strength of passwords and identify weak or
compromised ones, but it does not ensure that users follow the standards3. A user-awareness program can
help educate users about the importance of password security and the best practices for creating and using
passwords, but it does not ensure that users comply with the standards. References: 1: NIST Password
Guidelines and Best Practices for 2020 - Auth0 2: Password synchronization - Wikipedia 3:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A risk assessment exercise has identified the threat of a denial of service (DoS) attack
    Executive management has decided to take no further action related to this risk. The MO ST likely reason
    for this decision is

A. the risk assessment has not defined the likelihood of occurrence
B. the reported vulnerability has not been validated
C. executive management is not aware of the impact potential
D. the cost of implementing controls exceeds the potential financial losses.

A

Answer: D

Explanation: The most likely reason for executive management to take no further action related to the risk
of a denial of service (DoS) attack is that the cost of implementing controls exceeds the potential financial
losses. This means that the risk is acceptable or tolerable for the organization, and that the benefits of
reducing the risk do not outweigh the costs of applying the controls. This decision is based on a cost-benefit
analysis, which is a common technique for evaluating and comparing different risk response options. A
cost- benefit analysis considers the following factors:
✑ The estimated impact of the risk, which is the potential loss or damage that the
organization may suffer if the risk materializes. The impact can be expressed in quantitative or qualitative
terms, such as monetary value, reputation, customer satisfaction, legal liability, etc.
✑ The estimated likelihood of occurrence, which is the probability or frequency that
the risk will occur within a given time period. The likelihood can be expressed in numerical or descriptive
terms, such as percentage, rating, high, medium, low, etc.
✑ The estimated cost of controls, which is the total amount of resources that the
organization needs to invest in order to implement and maintain the controls. The cost can include direct
and indirect expenses, such as hardware, software, personnel, training, maintenance, etc.
✑ The estimated benefit of controls, which is the reduction in the impact or likelihood
of the risk as a result of implementing the controls. The benefit can be expressed in the same terms as the
impact or likelihood, such as monetary value, percentage, rating, etc.
A cost-benefit analysis can be performed using various methods, such as net present value (NPV), return
on investment (ROI), internal rate of return (IRR), etc. The general principle is to compare the cost and
benefit of each control option, and select the one that provides the highest net benefit or the lowest net cost.
A control option is considered feasible and desirable if its benefit exceeds its cost, or if its cost is lower than
the impact of the risk.
In this case, executive management has decided to take no further action related to the risk of a DoS attack,
which implies that the cost of implementing controls exceeds the potential financial losses. This could be
because the impact or likelihood of the risk is low, or because the cost or complexity of the controls is high,
or both. For example, the organization may have a robust backup and recovery system, a diversified
network infrastructure, a strong customer loyalty, or a low dependency on online services, which reduce the
impact or likelihood of a DoS attack. Alternatively, the organization may face technical, financial, or
operational challenges in implementing effective controls, such as firewalls, load balancers, traffic filters, or
cloud services, which increase the cost or complexity of the controls. Therefore, executive management
may have concluded that the risk is acceptable or tolerable, and that taking no further action is the most
rational and economical choice.
The other options are not the most likely reasons for executive management to take no further action
related to the risk of a DoS attack, as they indicate a lack of proper risk assessment or validation. The risk
assessment should define the likelihood of occurrence and the reported vulnerability should be validated,
as these are essential steps for identifying and analyzing the risk. Executive management should be aware
of the impact potential, as this is a key factor for evaluating and prioritizing the risk. If any of these options
were true, executive management would not have enough information or evidence to make an informed
and justified decision about the risk response. References =
✑ CISM Review Manual, Chapter 2, pages 67-69
✑ CISM Exam Content Outline | CISM Certification | ISACA, Domain 2, Task 2.2
✑ Information Security Risk Management for CISM® - Pluralsight, Module 2, Section 2.3
✑ CISM: Information Risk Management Part 2 from Skillsoft - NICCS, Section 2.4
Executive management may not take action related to a risk if they have determined that the cost of
implementing necessary controls to mitigate the risk exceeds the potential financial losses that the
organization may incur if the risk were to materialize. In cases such as this, it is important for the information
security team to provide the executive team with thorough cost-benefit analysis that outlines the cost of
implementing the controls versus the expected losses from the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. An information security manager determines there are a significant number of exceptions to a newly
    released industry-required security standard. Which of the following should be done NEXT?

A. Document risk acceptances.
B. Revise the organization’s security policy.
C. Assess the consequences of noncompliance.
D. Conduct an information security audit.

A

Answer: C

Explanation: Assessing the consequences of noncompliance is the next step that should be done after
determining that there are a significant number of exceptions to a newly released industry-required security
standard. The information security manager should evaluate the potential impact and exposure of the
organization due to the noncompliance with the security standard. The assessment should consider the
legal, regulatory, contractual, and reputational implications of the noncompliance, as well as the likelihood
and severity of the incidents or penalties that may result from the noncompliance. The assessment should
also compare the cost and benefit of complying with the security standard versus accepting the risk of
noncompliance. The assessment should provide the basis for making informed and rational decisions about
how to address the noncompliance issue and prioritize the actions and resources needed to achieve
compliance. Documenting risk acceptances, revising the organization’s security policy, and conducting an
information security audit are all possible actions that may be taken to address the noncompliance issue,
but they are not the next steps that should be done. These actions should be performed after assessing the
consequences of noncompliance, and based on the results and recommendations of the assessment.
Documenting risk acceptances may be appropriate if the organization decides to accept the risk of
noncompliance, and if the risk is within the risk appetite and tolerance of the organization. Revising the
organization’s security policy may be necessary if the organization decides to comply with the security
standard, and if the policy needs to be updated to reflect the new requirements and expectations.
Conducting an information security audit may be useful if the organization wants to verify the level of
compliance and identify the gaps and weaknesses in the security controls and processes. Therefore,
assessing the consequences of noncompliance is the next step that should be done after determining that
there are a significant number of exceptions to a newly released industry-required security standard, as it
helps the information security manager to understand the risk and impact of the noncompliance and
to make informed and rational decisions about how to address it. References = CISM Review Manual 2023,
page 43 1; CISM Practice Quiz 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. A multinational organization is required to follow governmental regulations with different security
    requirements at each of its operating locations. The chief information security officer (CISO) should be
    MOST concerned with:

A. developing a security program that meets global and regional requirements.
B. ensuring effective communication with local regulatory bodies.
C. using industry best practice to meet local legal regulatory requirements.
D. monitoring compliance with defined security policies and standards.

A

Answer: A

Explanation: = A multinational organization is required to follow governmental regulations with different
security requirements at each of its operating locations. This means that the CISO has to deal with multiple
and diverse legal, regulatory, and compliance issues across different jurisdictions and markets. The CISO
should be most concerned with developing a security program that meets global and regional requirements,
such as ISO/IEC 27001, NIST CSF, PCI DSS, GDPR, etc. These standards provide a framework for
establishing, implementing, maintaining, and improving an information security management system
(ISMS) that aligns with the organization’s business objectives and risk appetite. The CISO should also
ensure that the security program is consistent and coherent across all operating locations, and that it
complies with the specific regulations of each location. Therefore, option A is the most appropriate answer.
References = CISM Review Manual 15th Edition, page 255; CISM Review Questions, Answers &
Explanations Database - 12 Month Subscription, QID 234.In this scenario, the chief information security
officer (CISO) should be most concerned with developing a security program that meets the global and
regional requirements of the organization. This includes considering the different legal and regulatory
requirements of each operating location, and designing a security program that meets all of these
requirements. The CISO should also ensure effective communication with local regulatory bodies to ensure
compliance and understanding of the security program. Additionally, the CISO should use industry best
practices and defined security policies and standards to ensure the program meets all applicable
requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?

A. Enhanced security monitoring and reporting
B. Reduced control complexity
C. Enhanced threat detection capability
D. Reduction of organizational risk

A

Answer: D

Explanation: The reduction of organizational risk is the desired outcome that best supports a decision to
invest in a new security initiative. The organizational risk is the level of exposure or uncertainty that the
organization faces in achieving its objectives. The organizational risk is influenced by various factors, such
as the threat landscape, the vulnerability of the assets, the impact of the incidents, and the effectiveness of
the controls. The information security manager should evaluate the organizational risk and propose security
initiatives that can reduce the risk to an acceptable level. The security initiatives should be aligned with the
business goals, the risk appetite, and the available resources of the organization. The security initiatives
should also provide a positive return on investment (ROI) or value for money (VFM) for the organization.
The reduction of organizational risk is the ultimate goal and benefit of any security initiative, as it enhances
the security posture, performance, and resilience of the organization. Enhanced security monitoring and
reporting, reduced control complexity, and enhanced threat detection capability are all possible outcomes
of security initiatives, but they are not the best ones to support a decision to invest in a new security
initiative. These outcomes are more specific and technical, and they may not directly relate to the business
objectives or the risk appetite of the organization. These outcomes are also intermediate or enabling, rather
than final or ultimate, as they may not necessarily lead to the reduction of organizational risk. For example,
enhanced security monitoring and reporting may improve the visibility and awareness of the security status,
but it may not prevent or mitigate the incidents. Reduced control complexity may simplify the security
management and maintenance, but it may not address the emerging or evolving threats. Enhanced threat
detection capability may increase the speed and accuracy of identifying the attacks, but it may not reduce
the impact or the likelihood of the attacks. Therefore, the reduction of organizational risk is the best
outcome to support a decision to invest in a new security initiative, as it demonstrates the value and
effectiveness of the security initiative for the organization. References = CISM Review Manual 2023, page
40 1; CISM Practice Quiz 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is the PRIMARY benefit to an organization when information security program requirements are
    aligned with employment and staffing processes?

A. Security incident reporting procedures are followed.
B. Security staff turnover is reduced.
C. Information assets are classified appropriately.
D. Access is granted based on task requirements.

A

Answer: D

Explanation: The PRIMARY benefit to an organization when information security program requirements are
aligned with employment and staffing processes is that access is granted based on task requirements. This
means that the organization can ensure that the employees have the appropriate level and scope of access
to the information assets and systems that they need to perform their duties, and that the access is granted,
reviewed, and revoked in accordance with the security policies and standards. This can help to reduce the
risk of unauthorized access, misuse, or leakage of information, as well as to comply with the principle of
least privilege and the segregation of duties12. Security incident reporting procedures are followed (A) is a
benefit to an organization when information security program requirements are aligned with employment
and staffing processes, but it is not the PRIMARY benefit. Security incident reporting procedures are the
steps and guidelines that the employees should follow when they detect, report, or respond to a security
incident. Aligning the information security program requirements with the employment and staffing
processes can help to ensure that the employees are aware of and trained on the security incident reporting
procedures, and that they are enforced and monitored by the management. This can help to improve the
effectiveness and efficiency of the incident response process, as well as to comply with the legal and
contractual obligations12. Security staff turnover is reduced (B) is a benefit to an organization when
information security program requirements are aligned with employment and staffing processes, but it is not
the PRIMARY benefit. Security staff turnover is the rate at which the security personnel leave or join the
organization. Aligning the information security program requirements with the employment and staffing
processes can help to reduce the security staff turnover by ensuring that the security roles and
responsibilities are clearly defined and communicated, that the security personnel are adequately
compensated and motivated, and that the security personnel are evaluated and developed regularly. This
can help to retain the security talent and expertise, as well as to reduce the costs and risks associated with
the security staff turnover12. Information assets are classified appropriately © is a benefit to an
organization when information security program requirements are aligned with employment and staffing
processes, but it is not the PRIMARY benefit. Information asset classification is the process of assigning a
security level or category to the information assets based on their value, sensitivity, and criticality to the
organization. Aligning the information security program requirements with the employment and staffing
processes can help to ensure that the information assets are classified appropriately by establishing the
ownership and custody of the information assets, the criteria and methods for the information asset
classification, and the roles and responsibilities for the information asset classification. This can help to
protect the information assets according to their security level or category, as well as to comply with the
regulatory and contractual requirements12. References = 1: CISM Review Manual 15th Edition, page
75-76, 81-82, 88-89, 93-941; 2: CISM Domain 1: Information Security Governance (ISG) [2022 update]2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. An information security manager learns through a threat intelligence service that the organization may be
    targeted for a major emerging threat. Which of the following is the information security manager’s FIRST
    course of action?

A. Conduct an information security audit.
B. Validate the relevance of the information.
C. Perform a gap analysis.
D. Inform senior management

A

Answer: B

Explanation: The information security manager’s first course of action should be to validate the relevance of
the information received from the threat intelligence service. This means verifying the source, credibility,
accuracy, and timeliness of the information, as well as assessing the potential impact and likelihood of the
threat for the organization. This will help the information security manager to determine the appropriate
response and prioritize the actions to mitigate the threat. Conducting an information security audit,
performing a gap analysis, and informing senior management are possible subsequent actions, but they
are not the first course of action. An information security audit is a systematic and independent assessment
of the effectiveness of the information security controls and processes. A gap analysis is a comparison of
the current state of the information security program with the desired state or best practices. Informing
senior management is a communication activity that should be done after validating the information and
assessing the risk. References = CISM Review Manual, 16th Edition, pages 44-451; CISM Review
Questions, Answers & Explanations Manual, 10th Edition, page 632
The first step the information security manager should take upon learning of the potential threat is to
validate the relevance of the information. This should involve researching the threat to evaluate its potential
impact on the organization and to determine the accuracy of the threat intelligence. Once the information is
validated, the information security manager can then take action, such as informing senior management,
conducting an information security audit, or performing a gap analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the
    business risk associated with critical system outages. Which type of control is being considered?

A. Preventive
B. Corrective
C. Detective
D. Deterrent

A

Answer: A

Explanation: A preventive control is a type of control that aims to prevent or reduce the occurrence or
impact of potential adverse events that can affect the organization’s objectives and performance.
Preventive controls are proactive measures that are implemented before an incident happens, and they are
designed to address the root causes or sources of risk. Preventive controls can also help the organization
to comply with the relevant laws, regulations, standards, and best practices regarding information
security1.
An example of a preventive control is a redundant power supply, which is a backup or
alternative source of power that can be used in case of a power outage or failure. A redundant power
supply can reduce the business risk associated with critical system outages, which can result from power
disruptions caused by natural disasters, technical faults, human errors, or malicious attacks. A redundant
power supply can provide the following benefits for information security2:
✑ Maintain the availability and continuity of the critical systems and services that
depend on power, such as servers, databases, networks, or applications. A redundant power supply can
ensure that the critical systems and services can operate normally or resume quickly after a power outage
or failure, minimizing the downtime and data loss that can affect the organization’s operations, customers,
or reputation.
✑ Protect the integrity and reliability of the critical systems and data that are stored or
processed by the power-dependent devices, such as computers, hard drives, or memory cards. A
redundant power supply can prevent or reduce the damage or corruption of the critical systems and data
that can be caused by sudden or unexpected power fluctuations, surges, or interruptions, which can
compromise the accuracy, completeness, or consistency of the information.
✑ Enhance the resilience and redundancy of the power infrastructure and network
that supports the critical systems and services. A redundant power supply can provide an alternative or
backup route for power delivery and distribution, which can increase the flexibility and adaptability of the
power infrastructure and network to cope with different scenarios or conditions of power supply or demand.
The other options are not the type of control that is being considered by the organization. A corrective
control is a type of control that aims to restore or recover the normal state or function of the affected
systems or processes after an incident has occurred. A corrective control is a reactive measure that is
implemented during or after an incident, and it is designed to address the consequences or impacts of risk.
A corrective control can also help the organization to learn from the incident and improve its information
security practices1. An example of a corrective control is a backup or restore system, which is a method of
creating and restoring copies of the system or data that have been lost or damaged due to an incident.
A detective control is a type of control that aims to identify or discover the occurrence or existence of an
incident or a deviation from the expected or desired state or behavior of the systems or processes. A
detective control is a monitoring or auditing measure that is implemented during or after an incident, and it
is designed to provide information or evidence of risk. A detective control can also help the organization to
analyze or investigate the incident and determine the root cause or source of risk1. An example of a
detective control is a log or alert system, which is a tool of recording or reporting the activities or events that
have occurred or are occurring within the systems or processes.
A deterrent control is a type of control that aims to discourage or dissuade the potential perpetrators or
sources of risk from initiating or continuing an incident or an attack. A deterrent control is a psychological or
behavioral measure that is implemented before or during an incident, and it is designed to influence or
manipulate the motivation or intention of risk. A deterrent control can also help the organization to reduce
the likelihood or frequency of incidents or attacks1. An example of a deterrent control is a warning or
notification system, which is a method of communicating or displaying the consequences or
penalties of violating the information security policies or rules. References = Risk Control Techniques:
Preventive, Corrective, Directive, And …, Learn Different types of Security Controls in CISSP - Eduonix
Blog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which of the following BEST enables an organization to transform its culture to support information
    security?

A. Periodic compliance audits
B. Strong management support
C. Robust technical security controls
D. Incentives for security incident reporting

A

Answer: B

Explanation: According to the CISM Review Manual (Digital Version), page 5, information security culture is
the set of values, attitudes, and behaviors that shape how an organization and its employees view and
practice information security. Transforming the information security culture requires a change management
process that involves the following steps: creating a sense of urgency, forming a powerful coalition,
developing a vision and strategy, communicating the vision, empowering broad-based action, generating
short-term wins, consolidating gains and producing more change, and anchoring new approaches in the
culture1. Among the four options, strong management support is the best enabler for transforming the
information security culture, as it can provide the necessary leadership, resources, sponsorship, and
alignment for the change management process. Periodic compliance audits, robust technical security
controls, and incentives for security incident reporting are important elements of information security, but
they are not sufficient to change the culture without strong management support. References = 1: CISM
Review Manual (Digital Version), page 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Which of the following is the GREATEST benefit of including incident classification criteria within an incident
    response plan?

A. Ability to monitor and control incident management costs
B. More visibility to the impact of disruptions
C. Effective protection of information assets
D. Optimized allocation of recovery resources

A

Answer: D

Explanation: The explanation given in the manual is:
Incident classification criteria enable an organization to prioritize incidents based on their impact and
urgency. This allows for an optimized allocation of recovery resources to minimize business disruption and
ensure timely restoration of normal operations. The other choices are benefits of incident management but
not directly related to incident classification criteri
A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Which of the following should be an information security manager’s FIRST course of action when a newly
    introduced privacy regulation affects the business?

A. Consult with IT staff and assess the risk based on their recommendations
B. Update the security policy based on the regulatory requirements
C. Propose relevant controls to ensure the business complies with the regulation
D. Identify and assess the risk in the context of business objectives

A

Answer: D

Explanation: Identify and assess the risk in the context of business objectives. Before making any changes
to the security policy or introducing any new controls, the information security manager should first identify
and assess the risk that the new privacy regulation poses to the business. This should be done in the
context of the overall business objectives so that the security measures introduced are tailored to meet the
specific needs of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. An intrusion has been detected and contained. Which of the following steps represents the BEST practice
    for ensuring the integrity of the recovered system?

A. Install the OS, patches, and application from the original source.
B. Restore the OS, patches, and application from a backup.
C. Restore the application and data from a forensic copy.
D. Remove all signs of the intrusion from the OS and application.

A

Answer: A

Explanation: After an intrusion has been detected and contained, the system should be
recovered to a known and trusted state. The best practice for ensuring the integrity of the recovered system
is to install the OS, patches, and application from the original source, such as the vendor’s website or
medi
A. This way, any malicious code or backdoors that may have been inserted by the intruder can be
eliminated. Restoring the OS, patches, and application from a backup may not guarantee the integrity of the
system, as the backup may have been compromised or outdated. Restoring the application and data from a
forensic copy may preserve the evidence of the intrusion, but it may also reintroduce the vulnerability or
malware that allowed the intrusion in the first place. Removing all signs of the intrusion from the OS and
application may not be sufficient or feasible, as the intruder may have made subtle or hidden changes that
are difficult to detect or undo.
References =
✑ ISACA, CISM Review Manual, 16th Edition, 2020, page 2401
✑ ISACA, CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, 2020,
question ID 2132
The BEST practice for ensuring the integrity of the recovered system after an intrusion is to restore the OS,
patches, and application from a backup. This will ensure that the system is in a known good state, without
any potential residual malicious code or changes from the intrusion. Restoring from a backup also enables
the organization to revert to a previous configuration that has been tested and known to be secure. This
step should be taken prior to conducting a thorough investigation and forensic analysis to determine the
cause and extent of the intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Which of the following analyses will BEST identify the external influences to an organization’s information
    security?

A. Business impact analysis (BIA)
B. Gap analysis
C. Threat analysis
D. Vulnerability analysis

A

Answer: C

Explanation: A threat analysis will best identify the external influences to an organization’s information
security because it involves identifying and evaluating the sources and likelihood of potential adverse
events that could affect the organization’s assets, operations, or reputation. External influences include
factors such as emerging technologies, social media, business environment, risk tolerance, regulatory
requirements, third-party considerations, and threat landscape1. A threat analysis can help the organization
to align its information security strategy with its business objectives and risk appetite, and to prioritize and
mitigate the most relevant and impactful threats. A business impact analysis (BIA) is a process of assessing
the potential consequences of a disruption to the organization’s critical business functions or processes. A
BIA does not directly identify the external influences to the organization’s information security, but rather the
impact of those influences on the organization’s continuity and recovery. A gap analysis is a process of
comparing the current state of the organization’s information security with a desired or expected state,
based on best practices, standards, or frameworks. A gap analysis does not directly identify the external
influences to the organization’s information security, but rather the areas of improvement or compliance. A
vulnerability analysis is a process of identifying and evaluating the weaknesses or flaws in the
organization’s information systems or processes that could be exploited by threats. A vulnerability analysis
does not directly identify the external influences to the organization’s information security, but rather the
exposure or susceptibility of the organization to those influences. References = CISM Review Manual, 15th
Edition, pages 22-232; CISM Exam Content Outline, Domain 1, Knowledge Statement 1.113
Threat analysis is a process that is used to identify and assess the external influences or threats that could
potentially affect an organization’s information security. It is used to identify potential risks and develop
strategies to mitigate or reduce those risks. Threat analysis involves analyzing the environment, identifying
potential threats and their potential impacts, and then evaluating the organization’s current security
measures and developing strategies to address any deficiencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Which of the following will ensure confidentiality of content when accessing an email system over the
    Internet?

A. Multi-factor authentication
B. Digital encryption
C. Data masking
D. Digital signatures

A

Answer: B

Explanation: Digital encryption is the process of transforming data into an unreadable form using a secret
key or algorithm. Digital encryption will ensure the confidentiality of content when accessing an email
system over the Internet, as it prevents unauthorized parties from intercepting, viewing, or modifying the
email messages. Digital encryption can be applied to both the email content and the email transmission,
using different methods such as symmetric encryption, asymmetric encryption, or hybrid encryption. Digital
encryption can also provide other benefits such as authentication, integrity, and non-repudiation,
depending on the encryption scheme and the use of digital signatures or certificates. References = CISM
Review Manual 15th Edition, page 101, page 102.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. Reevaluation of risk is MOST critical when there is:

A. resistance to the implementation of mitigating controls.
B. a management request for updated security reports.
C. a change in security policy.
D. a change in the threat landscape.

A

Answer: D

Explanation: = Reevaluation of risk is a vital aspect of the risk management process that helps
organizations to identify and analyze new or evolving threats, vulnerabilities, and impacts on their assets,
and implement the necessary controls to mitigate them. Reevaluation of risk is most critical when there is a
change in the threat landscape, which refers to the external and internal factors that influence the likelihood
and severity of potential attacks on the organization’s information assets. A change in the threat landscape
may be caused by various factors, such as technological innovations, geopolitical events, cybercrime
trends, regulatory changes, or organizational changes. A change in the threat landscape may introduce
new risks or alter the existing risk profile of the organization, requiring a reassessment of the risk appetite,
tolerance, and strategy. Reevaluation of risk helps the organization to adapt to the changing threat
landscape and ensure that the information security program remains effective, efficient, and aligned with
the business objectives.
References =
✑ CISM Review Manual 15th Edition, page 1131
✑ CISM Domain 2: Information Risk Management (IRM) [2022 update]2
✑ Reevaluation of Risk | CISM Exam Question Answer | ISACA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function
    effectively without this server Which of the following would MOST effectively allow the hospital to avoid
    paying the ransom?

A. Employee training on ransomware
B. A properly tested offline backup system
C. A continual server replication process
D. A properly configured firewall

A

Answer: B

Explanation: The most effective way to avoid paying the ransom in a ransomware attack is to have a
properly tested offline backup system. A ransomware attack is a type of cyberattack that encrypts the
victim’s data or systems and demands a payment for the decryption key. A properly tested offline backup
system is a method of storing copies of the data or systems in a separate location that is not connected to
the network or the internet. By having a properly tested offline backup system, the hospital can restore its
critical server from the backup without paying the ransom or losing any dat
A. The other options are not the
most effective way to avoid paying the ransom in a ransomware attack, although they may be some
preventive or detective measures. Employee training on ransomware is a preventive measure that can help
raise awareness and reduce the likelihood of falling victim to phishing or other social engineering
techniques that may deliver ransomware. However, it does not guarantee that employees will always follow
best practices or that ransomware will not enter the network through other means. A continual server
replication process is a method of creating copies of the server data or systems in real time or near real
time. However, it may not be effective against ransomware, as the replication process may also copy the
encrypted data or systems, making them unusable. A properly configured firewall is a preventive measure
that can help block malicious network traffic and prevent unauthorized access to the server. However, it
does not guarantee that ransomware will not bypass the firewall through other channels, such as email
attachments or removable medi
A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. Which of the following documents should contain the INITIAL prioritization of recovery of services?

A. IT risk analysis
B. Threat assessment
C. Business impact analysis (BIA)
D. Business process map

A

Answer: C

Explanation: A business impact analysis (BIA) is the document that should contain the initial priori-tization
of recovery of services. A BIA is a process of identifying and analyzing the po-tential effects of disruptions
to critical business functions and processes. A BIA typi-cally includes the following steps1:
•Identifying the critical business functions and processes that support the organization’s mission and
objectives.
•Estimating the maximum tolerable downtime (MTD) for each function or process, which is the longest time
that the organization can afford to be without that function or process before suffering unacceptable
consequences.
•Assessing the potential impacts of disruptions to each function or process, such as finan- cial losses,
reputational damage, legal liabilities, regulatory penalties, customer dissatis- faction, etc.
•Prioritizing the recovery of functions or processes based on their MTDs and impacts, and assigning
recovery time objectives (RTOs) and recovery point objectives (RPOs) for each function or process. RTOs
are the target times for restoring functions or processes after a disruption, while RPOs are the acceptable
amounts of data loss in case of a disruption.
•Identifying the resources and dependencies required for each function or process, such as staff,
equipment, software, data, suppliers, customers, etc.
A BIA provides the basis for developing a business continuity plan (BCP), which is a document that outlines
the strategies and procedures for ensuring the continuity or re- covery of critical business functions and
processes in the event of a disruption2. The other options are not documents that should contain the initial
prioritization of recov-ery of services. An IT risk analysis is a process of identifying and evaluating the
threats and vulnerabilities that affect the IT systems and assets of an organization. It helps to determine the
likelihood and impact of potential IT incidents, and to select and imple-ment appropriate controls to mitigate
the risks3. A threat assessment is a process of identifying and analyzing the sources and capabilities of
adversaries that may pose a threat to an organization’s security. It helps to determine the level of threat
posed by different actors, and to develop countermeasures to prevent or respond to attacks. A business
process map is a visual representation of the activities, inputs, outputs, roles, and resources involved in a
business process. It helps to understand how a process works, how it can be improved, and how it relates
to other processes. References: 1: Business impact analysis (BIA) - Wikipedia 2: Business continuity plan -
Wikipedia 3: IT risk management - Wikipedia : Threat assessment - Wikipedia : Business process map-ping
- Wikipedia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. The fundamental purpose of establishing security metrics is to:

A. increase return on investment (ROI)
B. provide feedback on control effectiveness
C. adopt security best practices
D. establish security benchmarks

A

Answer: B

Explanation: The fundamental purpose of establishing security metrics is to provide feedback on the
effectiveness of the information security controls and processes. Security metrics are quantitative or
qualitative measures that indicate how well the organization is achieving its security objectives and goals.
Security metrics can help the information security manager to monitor, evaluate, and improve the
performance of the information security program, as well as to identify gaps, weaknesses, and areas for
improvement. Security metrics can also help the organization to demonstrate compliance with internal and
external standards, regulations, and best practices. Increasing return on investment (ROI), adopting
security best practices, and establishing security benchmarks are possible outcomes or benefits of using
security metrics, but they are not the fundamental purpose of establishing them. References = CISM
Review Manual, 16th Edition, pages 46-471; CISM Review Questions, Answers & Explanations Manual,
10th Edition, page 642
Learn more: 1. isac
A.org2. amazon.com3. gov.uk
Security metrics are used to measure the effectiveness of controls and evaluate the overall security posture
of an organization. This feedback provides an understanding of the progress made towards achieving
security objectives and allows organizations to make necessary adjustments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. Which of the following is MOST important for an information security manager to verify when selecting a
    third-party forensics provider?

A. Existence of a right-to-audit clause
B. Results of the provider’s business continuity tests
C. Technical capabilities of the provider
D. Existence of the provider’s incident response plan

A

Answer: C

Explanation: The technical capabilities of the provider are the MOST important thing for an information
security manager to verify when selecting a third-party forensics provider because they determine the
quality, reliability, and validity of the forensic services and results that the provider can deliver. The
technical capabilities of the provider include the skills, experience, and qualifications of the forensic staff,
the methods, tools, and standards that the forensic staff use, and the facilities, equipment, and resources
that the forensic staff have. The information security manager should verify that the technical capabilities of
the provider match the forensic needs and expectations of the organization, such as the type, scope, and
complexity of the forensic investigation, the legal and regulatory requirements, and the time and cost
constraints12. The existence of a right-to-audit clause (A) is an important thing for an information security
manager to verify when selecting a third-party forensics provider, but it is not the MOST important thing. A
right-to-audit clause is a contractual provision that grants the organization the right to audit or review the
performance, compliance, and security of the provider. A right-to-audit clause can help to ensure the
accountability, transparency, and quality of the provider, as well as to identify and resolve any issues or
disputes that may arise during or after the forensic service. However, a right-to-audit clause does not
guarantee that the provider has the technical capabilities to conduct the forensic service effectively and
efficiently12. The results of the provider’s business continuity tests (B) are an important thing for an
information security manager to verify when selecting a third-party forensics provider, but they are not the
MOST important thing. The results of the provider’s business continuity tests can indicate the ability and
readiness of the provider to continue or resume the forensic service in the event of a disruption, disaster, or
emergency. The results of the provider’s business continuity tests can help to assess the availability,
resilience, and recovery of the provider, as well as to mitigate the risks of losing or compromising the
forensic evidence or dat
A. However, the results of the provider’s business continuity tests do not ensure
that the provider has the technical capabilities to perform the forensic service accurately and
professionally12. The existence of the provider’s incident response plan (D) is an important thing for an
information security manager to verify when selecting a third- party forensics provider, but it is not the
MOST important thing. The existence of the provider’s incident response plan can demonstrate the
preparedness and capability of the provider to detect, report, and respond to any security incidents that
may affect the forensic service or the organization. The existence of the provider’s incident response plan
can help to protect the confidentiality, integrity, and availability of the forensic evidence or data, as well as
to comply with the legal and contractual obligations. However, the existence of the provider’s incident
response plan does not confirm that the provider has the technical capabilities to execute the forensic
service competently and ethically12. References = 1: CISM Review Manual 15th Edition, page 310-3111; 2:
A Risk-Based Management Approach to Third-Party Data Security, Risk and Compliance - ISACA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. An organization faces severe fines and penalties if not in compliance with local regulatory requirements by
    an established deadline. Senior management has asked the information security manager to prepare an
    action plan to achieve compliance.
    Which of the following would provide the MOST useful information for planning purposes?

A. Results from a business impact analysis (BIA)
B. Deadlines and penalties for noncompliance
C. Results from a gap analysis
D. An inventory of security controls currently in place

A

Answer: C

Explanation: Results from a gap analysis would provide the most useful information for planning purposes
when preparing an action plan to achieve compliance with local regulatory requirements by an established
deadline. A gap analysis is an assessment of the difference between an organization’s current state of
compliance and its desired level or standard. It is a process used to identify potential areas for improvement
by comparing actual performance with expected performance. A gap analysis can help to prioritize the
actions needed to close the gaps and comply with the regulatory requirements, as well as to estimate the
resources and time required for each action1. The other options are not as useful as results from a gap
analysis for planning purposes when preparing an action plan to achieve compliance with local regulatory
requirements by an established deadline. Deadlines and penalties for noncompliance are important factors
to consider, but they do not provide information on how to achieve compliance or what actions are needed2.
Results from a business impact analysis (BIA) are useful for identifying the critical processes and assets
that need to be protected, but they do not provide information on how to comply with the regulatory
requirements or what actions are needed3. An inventory of security controls currently in place is useful for
assessing the current state of compliance, but it does not provide information on how to comply with the
regulatory requirements or what actions are needed4. References: 3: Business impact analysis (BIA) -
Wikipedia 2: Compliance Gap Analysis & Effectiveness Evaluation | SMS 1: What is Gap Analysis in
Compliance | Scytale 4: Gap Analysis & Risk Assessment — Riddle Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. Which of the following should be the PRIMARY basis for determining the value of assets?

A. Cost of replacing the assets
B. Business cost when assets are not available
C. Original cost of the assets minus depreciation
D. Total cost of ownership (TCO)

A

Answer: B

Explanation: The primary basis for determining the value of assets should be the business cost when
assets are not available. This is because the value of assets is not only determined by their acquisition or
replacement cost, but also by their contribution to the organization’s business objectives and processes.
The business cost when assets are not available reflects the potential impact of losing or compromising the
assets on the organization’s operations, performance, reputation, and compliance. The business cost when
assets are not available can be estimated by conducting a business impact analysis (BIA), which identifies
the criticality, dependencies, and recovery requirements of the assets. By using the business cost when
assets are not available as the primary basis for determining the value of assets, the organization can
prioritize the protection and management of the assets according to their importance and risk level.
References = CISM Review Manual 15th Edition, page 64, page 65.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. Which of the following BEST enables an organization to provide ongoing assurance that legal and
    regulatory compliance requirements can be met?

A. Embedding compliance requirements within operational processes
B. Engaging external experts to provide guidance on changes in compliance requirements
C. Performing periodic audits for compliance with legal and regulatory requirements
D. Assigning the operations manager accountability for meeting compliance requirements

A

Answer: A

Explanation: Embedding compliance requirements within operational processes ensures that they are
consistently followed and monitored as part of normal business activities. This provides ongoing assurance
that legal and regulatory compliance requirements can be met. The other choices are not as effective as
embedding compliance requirements within operational processes.
Regulatory compliance involves following external legal mandates set forth by state, federal, or
international government2. Compliance requirements may vary depending on the industry, location, and
nature of the organization2. Compliance helps organizations avoid legal penalties, protect their reputation,
and ensure ethical conduct2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery
    plan (DRP)?

A. Storing the plan at an offsite location
B. Communicating the plan to all stakeholders
C. Updating the plan periodically
D. Conducting a walk-through of the plan

A

Answer: D

Explanation: A walk-through of the disaster recovery plan (DRP) is a method of testing the plan by
simulating a disaster scenario and having the participants review their roles and responsibilities, as well as
the procedures and resources required to execute the plan. A walk-through has the greatest positive impact
on the ability to execute the DRP, as it helps to identify and resolve any gaps, errors, or inconsistencies in
the plan, as well as to enhance the awareness and readiness of the stakeholders involved in the recovery
process. References = CISM Review Manual, 16th Edition, Chapter 5, Section 5.3.2.21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. Of the following, whose input is of GREATEST importance in the development of an information security
    strategy?

A. Process owners
B. End users
C. Security architects.
D. Corporate auditors

A

Answer: A

Explanation: Process owners are the people who are responsible for the design, execution, and
improvement of the business processes that support the organization’s objectives and operations. Process
owners have the greatest importance in the development of an information security strategy, as they
provide the input and feedback on the business requirements, expectations, and priorities that the
information security strategy should address and support. Process owners also help to identify and assess
the risks and impacts that the business processes face, and to define and implement the security controls
and measures that can mitigate or reduce them. Process owners also facilitate the alignment and
integration of the information security strategy with the business strategy, as well as the communication and
collaboration among the various stakeholders and functions involved in the information security program.
End users, security architects, and corporate auditors are all important stakeholders in the information
security program, but they do not have the greatest importance in the development of an information
security strategy. End users are the people who use the information systems and services that the
information security program protects and enables. End users provide the input and feedback on the
usability, functionality, and performance of the information systems and services, as well as the security
awareness and behavior that they exhibit. Security architects are the people who design and implement the
security architecture that supports the information security strategy. Security architects provide the input
and feedback on the technical requirements, capabilities, and solutions that the information security
strategy should leverage and optimize. Corporate auditors are the people who evaluate and verify the
compliance and effectiveness of the information security program. Corporate auditors provide the input and
feedback on the standards, regulations, and best practices that the information security strategy should
follow and adhere to. Therefore, process owners have the greatest importance in the development of an
information security strategy, as they provide the input and feedback on the business requirements,
expectations, and priorities that the information security strategy should address and support. References =
CISM Review Manual 2023, page 31 1; CISM Practice Quiz 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. Which of the following is the GREATEST benefit of information asset classification?

A. Helping to determine the recovery point objective (RPO)
B. Providing a basis for implementing a need-to-know policy
C. Supporting segregation of duties
D. Defining resource ownership

A

Answer: B

Explanation:
The greatest benefit of information asset classification is providing a basis for imple- menting a
need-to-know policy. Information asset classification is a process of catego- rizing information based on its
level of sensitivity and importance, and applying appro-priate security controls based on the level of risk
associated with that information1. A need-to- know policy is a principle that states that access to
information should be granted only to those individuals who require it to perform their official duties or
tasks2. The purpose of a need-to-know policy is to limit the exposure of sensitive information to
unauthorized or unnecessary parties, and to reduce the risk of data breaches, leaks, or misuse. Information
asset classification provides a basis for implementing a need-to-know policy by:
•Defining the value and protection requirements of different types of information
•Labeling the information with the appropriate classification level, such as public, internal, confidential,
secret, or top secret
•Establishing the roles and responsibilities of information owners, custodians, and users
•Enforcing access controls and encryption for the information
•Documenting the security policies and procedures for the information
By providing a basis for implementing a need-to-know policy, information asset classi- fication can help
organizations to protect their sensitive information, comply with rele-vant laws and regulations, and achieve
their business objectives. The other options are not the greatest benefits of information asset classification.
Helping to determine the recovery point objective (RPO) is not a benefit, but rather a consequence of
applying security controls based on the classification level. RPO is the acceptable amount of data loss in
case of a disruption3. Supporting segregation of duties is not a benefit, but rather a prerequisite for
implementing a need-to-know policy. Segregation of duties is a principle that states that no single individual
should have control over two or more phases of a business process or transaction that are susceptible to
errors or fraud4. De-fining resource ownership is not a benefit, but rather a component of information asset
classification. Resource ownership is the assignment of accountability and authority for an information
asset to an individual or a group5. References: 1: Information Classifi-cation - Advisera 2: Need-to-Know
Principle - NIST 3: Recovery Point Objective - NIST 4: Segregation of Duties - NIST 5: Resource
Ownership - NIST : Information Classification in Information Security - GeeksforGeeks : Information Asset
Classification Policy - UCI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. An anomaly-based intrusion detection system (IDS) operates by gathering data on:

A. normal network behavior and using it as a baseline lor measuring abnormal activity
B. abnormal network behavior and issuing instructions to the firewall to drop rogue connections
C. abnormal network behavior and using it as a baseline for measuring normal activity
D. attack pattern signatures from historical data

A

Answer: A

Explanation: An anomaly-based intrusion detection system (IDS) operates by gathering data on normal
network behavior and using it as a baseline for measuring abnormal activity. This is important because it
allows the IDS to detect any activity that is outside of the normal range of usage for the network, which can
help to identify potential malicious activity or security threats. Additionally, the IDS will monitor for any
changes in the baseline behavior and alert the administrator if any irregularities are detected. By contrast,
signature-based IDSs operate by gathering attack pattern signatures from historical data and comparing
them against incoming traffic in order to identify malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  1. Which of the following is the BEST way to assess the risk associated with using a Software as a Service
    (SaaS) vendor?

A. Verify that information security requirements are included in the contract.
B. Request customer references from the vendor.
C. Require vendors to complete information security questionnaires.
D. Review the results of the vendor’s independent control reports.

A

Answer: D

Explanation: Reviewing the results of the vendor’s independent control reports is the best way to assess
the risk associated with using a SaaS vendor because it provides an objective and reliable evaluation of the
vendor’s security controls and practices. Independent control reports, such as SOC 2 or ISO 27001, are
conducted by third-party auditors who verify the vendor’s compliance with industry standards and best
practices. These reports can help the customer identify any gaps or weaknesses in the vendor’s security
posture and determine the level of assurance and trust they can place on the vendor.
Verifying that information security requirements are included in the contract is a good practice, but it does
not provide sufficient assurance that the vendor is actually meeting those requirements. The contract may
also have limitations or exclusions that reduce the customer’s rights or remedies in case of a breach or
incident.
Requesting customer references from the vendor is not a reliable way to assess the risk associated with
using a SaaS vendor because the vendor may only provide positive or biased references that do not reflect
the true experience or satisfaction of the customers. Customer references may also not have the same
security needs or expectations as the customer who is conducting the assessment.
Requiring vendors to complete information security questionnaires is a useful way to gather information
about the vendor’s security policies and procedures, but it does not provide enough evidence or verification
that the vendor is actually implementing and maintaining those policies and procedures. Information
security questionnaires are also subject to the vendor’s self-reporting and interpretation, which may not be
accurate or consistent. References =
✑ CISM Review Manual 15th Edition, page 144
✑ SaaS Security Risk and Challenges - ISACA1
✑ SaaS Security Checklist & Assessment Questionnaire | LeanIX2
✑ Risk Assessment Guide for Microsoft Cloud3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  1. An organization is in the process of acquiring a new company Which of the following would be the BEST
    approach to determine how to protect newly acquired data assets prior to integration?

A. Include security requirements in the contract
B. Assess security controls.
C. Perform a risk assessment
D. Review data architecture.

A

Answer: C

Explanation: Performing a risk assessment is the best approach to determine how to protect newly acquired
data assets prior to integration, as it will help to identify the threats, vulnerabilities, impacts, and likelihoods
of the data assets, and to prioritize the appropriate risk treatment options. Including security requirements in
the contract is a good practice, but it may not be sufficient to address the specific risks of the data assets.
Assessing security controls and reviewing data architecture are also important steps, but they should be
done after performing a risk assessment, as they will depend on the risk level and the risk app
The best approach to determine how to protect newly acquired data assets prior to integration is to perform
a risk assessment. A risk assessment will identify the various threats and vulnerabilities associated with the
data assets and help the organization develop an appropriate security strategy. This risk assessment
should include an assessment of the security controls in place to protect the data, a review of the data
architecture, and a review of any contractual requirements related to security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  1. Which of the following defines the triggers within a business continuity plan (BCP)? @

A. Needs of the organization
B. Disaster recovery plan (DRP)
C. Information security policy
D. Gap analysis

A

Answer: A

Explanation: The needs of the organization define the triggers within a business continuity plan (BCP).
Triggers are the events or conditions that initiate the activation of the BCP. The triggers should be based on
the organization’s business objectives, risk appetite, recovery time objectives, and recovery point
objectives. The triggers should also be aligned with the organization’s information security policy, disaster
recovery plan, and gap analysis. However, these are not the primary factors that define the triggers, but
rather the supporting elements that help implement the BCP. The needs of the organization are the main
drivers for determining the triggers, as they reflect the organization’s priorities, expectations, and
requirements for business continuity. References =
✑ CISM Review Manual (Digital Version) 1, Chapter 4: Information Security Incident
Management, pages 191-192, 195-196, 199-200.
✑ Business Continuity Management Guideline 2, page 5, Section 4.2.1: Triggers
✑ Business Continuity Plan - Open Risk Manual 3, page 1, Section 1: Introduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  1. Which of the following is the BEST indication of effective information security governance?

A. Information security is considered the responsibility of the entire information security team.
B. Information security controls are assigned to risk owners.
C. Information security is integrated into corporate governance.
D. Information security governance is based on an external security framework.

A

Answer: C

Explanation: Information security governance (ISG) is the process of establishing and maintaining a
framework to provide assurance that information security strategies are aligned with and support business
objectives, are consistent with applicable laws and regulations through adherence to policies and internal
controls, and provide assignment of responsibility, all in an effort to manage risk1. Effective ISG ensures
that information security is integrated into corporate governance and is considered an essential component
of enterprise governance2. Information security is not just the responsibility of the information security team,
but of all stakeholders in the organization3. Information security controls are not assigned to risk owners,
but to control owners who are accountable for implementing and maintaining the controls4. Information
security governance is not based on an external security framework, but on the organization’s own
objectives, risk appetite, and compliance requirements. References = 1: CISM Review Manual (Digital
Version), page 3 2: CISM Review Manual (Digital Version), page 4 3: CISM Review Manual (Digital
Version), page 5 4: CISM Review Manual (Digital Version), page 14 : CISM Review Manual (Digital
Version), page 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
  1. Which of the following is the MOST important consideration when defining a recovery strategy in a business
    continuity plan (BCP)?

A. Legal and regulatory requirements
B. Likelihood of a disaster
C. Organizational tolerance to service interruption
D. Geographical location of the backup site

A

Answer: C

Explanation: = The organizational tolerance to service interruption is the most important consideration
when defining a recovery strategy in a business continuity plan (BCP), as it reflects the degree of risk that
the organization is willing to accept in the event of a disaster. The organizational tolerance to service
interruption determines the acceptable level of downtime, data loss, or disruption that the organization can
tolerate, and thus guides the selection of recovery objectives, strategies, and resources. Legal and
regulatory requirements are external factors that influence the recovery strategy, but are not the primary
consideration. Likelihood of a disaster is a factor that affects the recovery strategy, but is not the most
important one. Geographical location of the backup site is a factor that affects the recovery strategy, but is
not as critical as organizational tolerance to service interruption. References = CISM Review Manual, 16th
Edition, page 1731; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 792
Learn more: 1. isac
A.org2. amazon.com3. gov.uk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. What should be an information security manager’s MOST important consideration when developing a
    multi-year plan?

A. Ensuring contingency plans are in place for potential information security risks
B. Ensuring alignment with the plans of other business units
C. Allowing the information security program to expand its capabilities
D. Demonstrating projected budget increases year after year

A

Answer: B

Explanation: = The most important consideration when developing a multi-year plan for information security
is to ensure alignment with the plans of other business units. Alignment means that the information security
plan supports and enables the achievement of the business objectives, strategies, and priorities of the
organization and its various units. Alignment also means that the information security plan is consistent and
compatible with the plans of other business units, and that it addresses the needs, expectations, and
requirements of the relevant stakeholders1 .
By ensuring alignment with the plans of other business units, the information security manager can achieve
the following benefits1 :
✑ Increase the value and effectiveness of information security: By aligning the information security plan
with the business goals and drivers, the information security manager can demonstrate the value and
contribution of information security to the organization’s performance, growth, and competitiveness. The
information security manager can also ensure that the information security plan addresses the most critical
and relevant risks and opportunities for the organization and its units, and that it provides adequate and
appropriate protection and support for the organization’s assets, processes, and activities.
✑ Enhance the communication and collaboration with other business units: By aligning the information
security plan with the plans of other business units, the information security manager can enhance the
communication and collaboration with the other business unit leaders and managers, who are the key
stakeholders and partners in information security. The information security manager can also solicit and
incorporate their input, feedback, and suggestions into the information security plan, and provide them with
timely and relevant information, guidance, and support. The information security manager can also foster a
culture of trust, respect, and cooperation among the different business units, and promote a shared vision
and commitment to information security.
✑ Optimize the use and allocation of resources for information security: By aligning the information
security plan with the plans of other business units, the information security manager can optimize the use
and allocation of resources for information security, such as budget, staff, time, or technology. The
information security manager can also avoid duplication, conflict, or waste of resources among the different
business units, and ensure that the information security plan is feasible, realistic, and sustainable. The
information security manager can also leverage the resources and capabilities of other business units to
enhance the information security plan, and provide them with the necessary resources and capabilities to
implement and maintain the information security plan.
The other options are not the most important consideration when developing a multi-year plan for
information security, as they are less strategic, comprehensive, or impactful than ensuring alignment with
the plans of other business units. Ensuring contingency plans are in place for potential information security
risks is an important component of the information security plan, but it is not the most important
consideration, as it focuses on the reactive and preventive aspects of information security, rather than the
proactive and enabling aspects. Allowing the information security program to expand its capabilities is an
important objective of the information security plan, but it is not the most important consideration, as it
depends on the availability and suitability of the resources, technologies, and opportunities for information
security, and it may not align with the organization’s needs, priorities, or constraints. Demonstrating
projected budget increases year after year is an important outcome of the information security plan, but it is
not the most important consideration, as it reflects the cost and demand of information security, rather than
the value and benefit of information security, and it may not be justified or supported by the organization’s
financial situation or expectations1 . References = CISM Domain 1: Information Security Governance (ISG)
[2022 update], CISM Domain 2: Information Risk Management (IRM) [2022 update], Aligning Information
Security with Business Strategy - ISACA, [Aligning Information Security with Business Objectives - ISACA]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
  1. Which of the following is the BEST justification for making a revision to a password policy?

A. Industry best practice
B. A risk assessment
C. Audit recommendation
D. Vendor recommendation

A

Answer: B

Explanation: A risk assessment should be conducted in order to identify the potential risks associated with
a particular system or process, and to determine the best way to mitigate those risks. Making a revision to a
password policy based on the results of a risk assessment is the best way to ensure that the policy is
effective and secure.
According to the Certified Information Security Manager (CISM) Study manual, the BEST justification for
making a revision to a password policy is a risk assessment. A risk assessment enables an organization to
identify and evaluate the risks to its information assets and determine the appropriate measures to mitigate
those risks, including password policies. Password policies should be based on the risks to the
organization’s information assets and the level of protection needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  1. Which of the following is the MOST effective way to demonstrate alignment of information security strategy
    with business objectives?

A. Balanced scorecard
B. Risk matrix
C. Benchmarking
D. Heat map

A

Answer: A

Explanation: The most effective way to demonstrate alignment of information security strategy with
business objectives is to use a balanced scorecard. A balanced scorecard is a strategic management tool
that translates the vision and mission of an organization into a set of performance indicators that measure
its progress towards its goals. A balanced scorecard typically includes four perspectives: financial,
customer, internal process, and learning and growth. Each perspective has a set of objectives, measures,
targets, and initiatives that are aligned with the organization’s strategy. A balanced scorecard helps to
communicate, monitor, and evaluate the performance of the organization and its information security
program in relation to its business objectives. A balanced scorecard also helps to identify and prioritize
improvement opportunities, as well as to align the activities and resources of the organization with its
strategy12.
The other options are not the most effective ways to demonstrate alignment of information security strategy
with business objectives. A risk matrix is a tool that displays the likelihood and impact of various risks on a
two-dimensional grid. A risk matrix helps to assess and prioritize risks, as well as to determine the
appropriate risk response strategies. However, a risk matrix does not show how the information security
strategy supports the business objectives, nor does it measure the performance or the value of the
information security program3. Benchmarking is a process of comparing the performance, practices, or
processes of an organization with those of other organizations or industry standards. Benchmarking helps
to identify best practices, gaps, and areas for improvement, as well as to set realistic and achievable goals.
However, benchmarking does not show how the information security strategy aligns with the business
objectives, nor does it reflect the unique characteristics and needs of the organization4. A heat map is a
graphical representation of data using colors to indicate the intensity or frequency of a variable. A
heat map can be used to visualize the distribution, concentration, or variation of risks, controls, or incidents
across different dimensions, such as business units, processes, or assets. A heat map helps to highlight
the areas of high risk or low control effectiveness, as well as to facilitate decision making and resource
allocation. However, a heat map does not show how the information security strategy contributes to the
business objectives, nor does it measure the outcomes or the benefits of the information security program5.
References =
✑ CISM Review Manual, 16th Edition | Print | English 2, Chapter 1: Information Security Governance,
pages 28-29, 31-32, 34-35.
✑ Balanced Scorecard - Wikipedia 1
✑ Risk Matrix - Wikipedia 3
✑ Benchmarking - Wikipedia 4
✑ Heat map - Wikipedia 5

42
Q
  1. Which of the following BEST demonstrates the added value of an information security program?

A. Security baselines
B. A gap analysis
C. A SWOT analysis
D. A balanced scorecard

A

Answer: D

Explanation: A balanced scorecard is a tool that can be used to demonstrate the added value of an
information security program by measuring and reporting on key performance indicators (KPIs) and key risk
indicators (KRIs) aligned with strategic objectives. Security baselines, a gap analysis and a SWOT analysis
are all useful for assessing and improving security posture, but they do not necessarily show how security
contributes to business value.

43
Q
  1. A penetration test was conducted by an accredited third party. Which of the following should be the
    information security manager’s FIRST course of action?

A. Ensure a risk assessment is performed to evaluate the findings
B. Ensure vulnerabilities found are resolved within acceptable timeframes
C. Request funding needed to resolve the top vulnerabilities
D. Report findings to senior management

A

Answer: D

44
Q
  1. Which of the following has the GREATEST influence on an organization’s information security strategy?

A. The organization’s risk tolerance
B. The organizational structure
C. Industry security standards
D. Information security awareness

A

Answer: A

Explanation: An organization’s information security strategy should be aligned with its risk tolerance, which
is the level of risk that an organization is willing to accept in pursuit of its objectives. The strategy should
aim to balance the cost of security controls with the potential impact of security incidents on the
organization’s objectives. Therefore, an organization’s risk tolerance has the greatest influence on its
information security strategy. The organization’s risk tolerance has the greatest influence on its information
security strategy because it determines how much risk the organization is willing to accept and how much
resources it will allocate to mitigate or transfer risk. The organizational structure, industry security standards,
and information security awareness are important factors that affect the implementation and effectiveness
of an information security strategy but not as much as the organization’s risk tolerance.
An information security strategy is a high-level plan that defines how an organization will achieve its
information security objectives and address its information security risks. An information security strategy
should align with the organization’s business strategy and reflect its mission, vision, values, and culture. An
information security strategy should also consider the external and internal factors that influence the
organization’s information security environment such as laws, regulations, competitors, customers,
suppliers, partners, stakeholders, employees etc.

45
Q
  1. Reverse lookups can be used to prevent successful:

A. denial of service (DoS) attacks
B. session hacking
C. phishing attacks
D. Internet protocol (IP) spoofing

A

Answer: D

Explanation: Reverse lookups can be used to prevent successful IP spoofing. IP spoofing is a type of attack
in which an attacker sends packets with a false source IP address in order to disguise their identity or
impersonate another system. By performing reverse lookups on the source IP address of incoming packets,
the system can verify that the packets are coming from a trusted source, and any packets with an invalid or
spoofed source IP can be discarded. This is an important measure for preventing IP spoofing, and can help
to reduce the risk of other types of attacks, such as DoS attacks, session hacking, and phishing attacks.

46
Q
  1. Which of the following is MOST important to convey to employees in building a security risk-aware culture?

A. Personal information requires different security controls than sensitive information.
B. Employee access should be based on the principle of least privilege.
C. Understanding an information asset’s value is critical to risk management.
D. The responsibility for security rests with all employees.

A

Answer: D

Explanation: = The most important message to convey to employees in building a security risk-aware
culture is that the responsibility for security rests with all employees, not just the information security
function or the management. A security risk-aware culture is a collective mindset of the people in the
organization working every day to protect the enterprise and its information assets from internal and
external threats. A security risk- aware culture requires the workforce to know the security risks and the
processes for avoiding or mitigating them, and to make thoughtful decisions that align with security policies
and standards. A security risk-aware culture also incorporates a broader corporate culture of day-to-day
actions that encourage employees to report security incidents, share security best practices, and participate
in security awareness and training programs. A security risk-aware culture helps to reduce the human
factor that causes 90 percent of all cyberattacks, and to offset the impact of corrupted or lost data,
decreased revenue, regulatory fines, and reputational damage. A security risk-aware culture turns people
from assets that must be protected into assets that actively contribute to the cybersecurity and risk
management posture and elevate security to being a business enabler rather than a business
impediment123.
Personal information requires different security controls than sensitive information is a true statement, but it
is not the most important message to convey to employees in building a
security risk-aware culture. Personal information is any information that can identify or relate to a natural
person, such as name, address, email, phone number, social security number, etc. Sensitive information is
any information that is confidential, proprietary, or has a high value or impact to the organization, such as
trade secrets, financial data, customer data, intellectual property, etc. Different types of information may
have different legal, regulatory, contractual, or ethical obligations to protect them from unauthorized access,
use, disclosure, modification, or destruction. Therefore, different security controls may be applied to
personal and sensitive information based on their classification, such as encryption, access control,
retention, disposal, etc. However, this message does not address the broader concept of security
risk-aware culture, which is not limited to information classification and protection, but also encompasses
the behaviors, attitudes, and values of the employees towards security.
Employee access should be based on the principle of least privilege is a good practice, but it is not the most
important message to convey to employees in building a security risk- aware culture. The principle of least
privilege states that users should only have the minimum level of access and permissions that are
necessary to perform their job functions, and no more. This principle helps to reduce the risk of
unauthorized or inappropriate actions, such as data leakage, fraud, sabotage, etc., by limiting the exposure
and impact of user activities. However, this message does not capture the essence of security risk-aware
culture, which is not only about access control, but also about the awareness, understanding, and
commitment of the employees to security.
Understanding an information asset’s value is critical to risk management is a valid point, but it is not the
most important message to convey to employees in building a security risk- aware culture. Understanding
an information asset’s value is essential to determine the potential impact and likelihood of a security risk,
and to prioritize the appropriate risk response strategies, such as avoidance, mitigation, transfer, or
acceptance. However, this message does not reflect the holistic nature of security risk-aware culture, which
is not only about risk assessment, but also about risk communication, risk treatment, and risk monitoring.
References =
✑ Building a Culture of Security - ISACA2
✑ The Risk-Conscious, Security-Aware Culture: The Forgotten Critical Security Control - Cisco3
✑ CISM ITEM DEVELOPMENT GUIDE - ISACA4

47
Q
  1. Which of the following should be considered FIRST when recovering a compromised system that needs a
    complete rebuild?

A. Patch management files
B. Network system logs
C. Configuration management files
D. Intrusion detection system (IDS) logs

A

Answer: A

Explanation: Patch management files are the files that contain the patches or updates for the software
applications and systems that are installed on the compromised system. Patch management files are
essential to recover a compromised system that needs a complete rebuild, as they can help to restore the
functionality, security, and performance of the system. Without patch management files, the system may
not be able to run properly or securely, and may expose the organization to further risks or vulnerabilities.
Network system logs, configuration management files, and intrusion detection system (IDS) logs are also
important for recovering a compromised system, but they should be considered after patch management
files. Network system logs can help to identify the source and scope of the attack, configuration
management files can help to restore the original settings and policies of the system, and IDS logs can help
to detect any malicious activities or anomalies on the system. References = CISM Review Manual, 16th
Edition, pages 193- 1941; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page
672

48
Q
  1. Which of the following is a PRIMARY benefit of managed security solutions?

A. Wider range of capabilities
B. Easier implementation across an organization
C. Greater ability to focus on core business operations
D. Lower cost of operations

A

Answer: C

Explanation: Managed security solutions are services provided by external vendors that offer security
expertise, resources, and tools to help organizations protect their information assets and systems. A
primary benefit of managed security solutions is that they allow organizations to focus on their core
business operations, while delegating the security tasks to the service provider. This can improve the
efficiency and effectiveness of the organization, as well as reduce the complexity and cost of managing
security internally. Managed security solutions can also provide a wider range of capabilities, easier
implementation across an organization, and lower cost of operations, but these are not the
primary benefits, as they may vary depending on the quality and scope of the service provider. References
= CISM Review Manual, 16th Edition, ISACA, 2020, p. 841; CISM Online Review Course, Domain 3:
Information Security Program Development and Management, Module 3: Information Security Program
Management, ISACA2

49
Q
  1. Which of the following backup methods requires the MOST time to restore data for an application?

A. Full backup
B. Incremental
C. Differential
D. Disk mirroring

A

Answer: B

Explanation: = An incremental backup method only backs up the data that has changed since the last
backup, whether it was a full or an incremental backup. This method requires the least amount of time and
storage space for backup, but it requires the most time to restore data for an application. To restore data
from an incremental backup, the latest full backup and all the subsequent incremental backups are needed.
A full backup method backs up all the data in a system or an application at a point in time. This method
requires the most amount of time and storage space for backup, but it requires the least time to restore data
for an application. To restore data from a full backup, only the latest full backup is needed. A differential
backup method backs up the data that has changed since the last full backup. This method requires more
time and storage space for backup than the incremental method, but less than the full backup method. It
also requires less time to restore data for an application than the incremental method, but more than the full
backup method. To restore data from a differential backup, the latest full backup and the latest differential
backup are needed. A disk mirroring method creates an exact copy of a disk on another disk in real time.
This method provides the highest level of availability and fault tolerance, but it also requires twice the
amount of disk space. To restore data from a disk mirroring method, the mirrored disk can be used as the
primary disk in case of a failure. References = CISM Review Manual 15th Edition, page 201-202.
The method that requires the MOST time to restore data for an application is a Full Backup. Full backups
contain all the data that is required to restore an application, but the process of restoring the data is the
most time-consuming as it involves copying all the data from the backup to the application. Incremental
backups only backup the changes made since the
last backup, differential backups only backup changes made since the last full backup, and disk mirroring
provides real-time data replication, so the data is immediately available.

50
Q
  1. Threat and vulnerability assessments are important PRIMARILY because they are:

A. used to establish security investments
B. the basis for setting control objectives.
C. elements of the organization’s security posture.
D. needed to estimate risk.

A

Answer: B

Explanation: Threat and vulnerability assessments are important primarily because they are the basis for
setting control objectives. Control objectives are the desired outcomes of implementing security controls,
and they should be aligned with the organization’s risk appetite and business objectives. Threat and
vulnerability assessments help to identify the potential sources and impacts of security incidents, and to
prioritize the mitigation actions based on the likelihood and severity of the risks. By conducting threat and
vulnerability assessments, the organization can establish the appropriate level and type of security controls
to protect its information assets and reduce the residual risk to an acceptable level. References = CISM
Review Manual (Digital Version), Chapter 3: Information Security Risk Management, Section 3.1: Risk
Identification, p. 115-1161. CISM Review Manual (Print Version), Chapter 3: Information Security Risk
Management, Section 3.1: Risk Identification, p. 115-1162. CISM ITEM DEVELOPMENT GUIDE, Domain
3: Information Security Program Development and Management, Task Statement 3.1, p. 193.
Threat and vulnerability assessments are important PRIMARILY because they are the basis for setting
control objectives. Control objectives are the desired outcomes or goals of implementing security controls in
an information system. They are derived from the risk assessment process, which identifies and evaluates
the threats and vulnerabilities that could affect the system’s confidentiality, integrity and availability. By
conducting threat and vulnerability assessments, an organization can determine the level of risk it faces
and establish the appropriate control objectives to mitigate those risks.

51
Q
  1. Which of the following should be the PRIMARY objective of an information security governance framework?

A. Provide a baseline for optimizing the security profile of the organization.
B. Demonstrate senior management commitment.
C. Demonstrate compliance with industry best practices to external stakeholders.
D. Ensure that users comply with the organization’s information security policies.

A

Answer: A

Explanation: According to the Certified Information Security Manager (CISM) Study Manual, The primary
objective of information security governance is to provide a framework for managing and controlling
information security practices and technologies at an enterprise level. Its goal is to manage and reduce risk
through a process of identification, assessment, and management of those risks.

While demonstrating senior management commitment, compliance with industry best practices, and
ensuring user compliance with policies are all important aspects of information security governance, they
are not the primary objective. The primary objective is to manage and reduce risk by establishing a
framework for managing and controlling information security practices and technologies at an enterprise
level.
Reference:
Certified Information Security Manager (CISM) Study Manual, 15th Edition, Page 60.

52
Q
  1. Which of the following is the MOST important detail to capture in an organization’s risk register?

A. Risk appetite
B. Risk severity level
C. Risk acceptance criteria
D. Risk ownership

A

Answer: D

Explanation: Risk ownership is the most important detail to capture in an organization’s risk register. Risk
ownership is the responsibility for managing a risk, including taking corrective action, and should be
assigned to a specific individual or team. It is important to note that the risk owner is not necessarily the
same as the risk acceptor, who is the individual or team who makes the final decision to accept a risk.
Capturing risk ownership in the risk register is important to ensure that risks are actively managed and that
the responsible parties are held accountable.

53
Q
  1. To support effective risk decision making, which of the following is MOST important to have in place?

A. Established risk domains
B. Risk reporting procedures
C. An audit committee consisting of mid-level management
D. Well-defined and approved controls

A

Answer: B

Explanation: To support effective risk decision making, it is most important to have risk reporting
procedures in place. Risk reporting procedures define how, when, and to whom risk information is
communicated within the organization. Risk reporting procedures ensure that risk information is timely,
accurate, consistent, and relevant for the decision makers. Risk reporting procedures also facilitate the
monitoring and review of risk management activities and outcomes. Risk reporting procedures enable the
organization to align its risk appetite and tolerance with its business objectives and strategies. Established
risk domains are not the most important factor for effective risk decision making. Risk domains are
categories or areas of risk that reflect the organization’s structure, objectives, and operations. Risk domains
help to organize and prioritize risk information, but they do not necessarily support the communication and
analysis of risk information for decision making. An audit committee consisting of mid-level management is
not the most important factor for effective risk decision making. An audit committee is a subcommittee of
the board of directors that oversees the internal and external audit functions of the organization. An audit
committee should consist of independent and qualified members, preferably from the board of directors or
senior management, not mid-level management. An audit committee provides assurance and oversight on
the effectiveness of risk management, but it does not directly support risk decision making. Well-defined
and approved controls are not the most important factor for effective risk decision making. Controls are
measures or actions that reduce the likelihood or impact of risk events. Well-defined and approved controls
are essential for implementing risk responses and mitigating risks, but they do not directly support the
identification, analysis, and evaluation of risks for decision making. References = CISM Review Manual
15th Edition, page 207-208.
Established risk domains are important for effective risk decision making because they provide a basis for
categorizing risks and assessing their impact on the organization. Risk domains are also used to assign risk
ownership and prioritize risk management activities.
Having established risk domains in place helps ensure that risks are properly identified and addressed, and
enables organizations to make informed and effective decisions about risk. Risk reporting procedures, an
audit committee consisting of mid-level management, and well-defined and approved controls are all
important components of an effective risk management program, but established risk domains are the most
important for effective risk decision making.

54
Q
  1. An employee has just reported the loss of a personal mobile device containing corporate information.
    Which of the following should the information security manager do FIRST?

A. Initiate incident response.
B. Disable remote
C. Initiate a device reset.
D. Conduct a risk assessment.

A

Answer: A

Explanation: Initiating incident response is the first course of action for an information security manager
when an employee reports the loss of a personal mobile device containing corporate information. This will
help to contain the incident, assess the impact, and take appropriate measures to prevent or mitigate
further damage. According to ISACA, incident management is one of the key processes for information
security governance. Initiating a device reset, disabling remote access, and conducting a risk assessment
are possible subsequent actions, but they should be part of the incident response plan. References: 1: Find,
lock, or erase a lost Android device - Google Account Help 2: Find, lock, or erase a lost Android device -
Android Help 3: Lost or Stolen Mobile Device Procedure - Information Security Office : CISM Practice Quiz |
CISM Exam Prep | ISACA : 200 CISM Exam Prep Questions | Free Practice Test | Simplilearn : CISM
practice questions to prep for the exam | TechTarget

55
Q
  1. Implementing the principle of least privilege PRIMARILY requires the identification of:

A. job duties
B. data owners
C. primary risk factors.
D. authentication controls

A

Answer: A

Explanation: Implementing the principle of least privilege primarily requires the identification of job duties.
Job duties are the specific tasks and responsibilities that an individual performs as part of their role in the
organization. By identifying the job duties, the organization can determine the minimum access privileges
necessary for each individual to perform their assigned function, and nothing more. This helps to reduce the
risk of unauthorized access, misuse, or compromise of information and resources. The principle of least
privilege is a key security principle that states that every module (such as a user, a process, or a program)
must be able to access only the information and resources that are necessary for its legitimate purpose12.
The other options are not the primary factors that require identification for implementing the principle of
least privilege. Data owners are the individuals or entities that have the authority and responsibility to define
the classification, usage, and protection of dat
A. Data owners may be involved in granting or revoking
access privileges to data, but they are not the ones who identify the job duties of the data users. Primary
risk factors are the sources or causes of potential harm or loss to the organization. Primary risk factors may
influence the level of access privileges granted to users, but they are not the ones who define the job duties
of the users. Authentication controls are the mechanisms that verify the identity of users or systems before
granting access to resources. Authentication controls may enforce the principle of least privilege, but they
are not the ones who determine the job duties of the users. References =
Principle of least privilege
What Is the Principle of Least Privilege and Why is it Important? - F5 1 4

56
Q
  1. Which of the following is the MOST important reason for obtaining input from risk owners when
    implementing controls?

A. To reduce risk mitigation costs
B. To resolve vulnerabilities in enterprise architecture (EA)
C. To manage the risk to an acceptable level
D. To eliminate threats impacting the business

A

Answer: C

Explanation: According to the Certified Information Security Manager (CISM) Study Manual, risk owners
are responsible for managing a risk, including taking corrective action to reduce the risk to an acceptable
level. When implementing controls, it is essential to obtain input from risk owners to ensure that the controls
are effective in managing the risk to an acceptable level.
By obtaining input from risk owners, the organization can ensure that the controls are tailored to the specific
risks and are effective in reducing the risk to an acceptable level. This can help to minimize the impact of
the risk on the organization and reduce the potential for financial or reputational damage.

57
Q
  1. When designing a disaster recovery plan (DRP), which of the following MUST be available in order to
    prioritize system restoration?

A. Business impact analysis (BIA) results
B. Key performance indicators (KPIs)
C. Recovery procedures
D. Systems inventory

A

Answer: A

Explanation: A business impact analysis (BIA) is a process that identifies and evaluates the potential effects
of disruptions to critical business operations as a result of a disaster, accident, emergency, or threat. A BIA
helps to determine the business continuity requirements and priorities for recovery of business functions
and processes, including their dependencies on IT systems, applications, and dat
A. A BIA also provides
information on the financial and operational impacts of a disruption, the recovery time objectives (RTOs),
the recovery point objectives (RPOs), and the minimum service levels for each business function and
process. A BIA is an essential input for designing a disaster recovery plan (DRP), which is a documented
and approved set of procedures and arrangements to enable an organization to respond to a disaster and
resume its critical functions within a predetermined timeframe. A DRP must be based on the BIA results to
ensure that the system restoration is prioritized according to the business needs and expectations. A DRP
must also consider the availability and suitability of the recovery resources, such as backup systems,
alternate sites, and personnel. A DRP should be tested and updated regularly to ensure its effectiveness
and alignment with the changing business environment and requirements. References = CISM Review
Manual, 15th Edition, pages 175-1761; CISM Review Questions, Answers & Explanations Database,
question ID 2182; Working Toward a Managed, Mature Business Continuity Plan - ISACA3; Part Two:
Business Continuity and Disaster Recovery Plans - CISM Foundations: Module 4 Course4.
A BIA is an important part of Disaster Recovery Planning (DRP). It helps identify the impact of a disruption
on the organization, including the critical systems and processes that must be recovered in order to
minimize that impact. The BIA results are used to prioritize system restoration and determine the resources
needed to get the organization back into operation as quickly as possible.

58
Q
  1. Which of the following sources is MOST useful when planning a business-aligned information security
    program?

A. Security risk register
B. Information security policy
C. Business impact analysis (BIA)
D. Enterprise architecture (EA)

A

Answer: C

Explanation: A business-aligned information security program is one that supports the organization’s
business objectives and aligns the information security strategy with the business functions. A business
impact analysis (BIA) is a process that identifies the critical business processes, assets, and functions of an
organization, and assesses their potential impact in the event of a disruption or loss. A BIA helps to
prioritize the information security requirements and controls that are needed to protect the organization’s
critical assets and functions from various threats and risks. Therefore, a BIA is one of the most useful
sources when planning a business-aligned information security program. References = CISM Review
Manual 15th Edition, page 254; CISM Review Questions, Answers & Explanations Database - 12 Month
Subscription, QID 229.The most useful source when planning a business-aligned information security
program is a Business Impact Analysis (BIA). A BIA is a process of identifying and evaluating the potential
effects of disruptions to an organization’s operations, and helps to identify the security controls and
measures that should be implemented to reduce the impact of those disruptions. The BIA should include an
assessment of the organization’s information security posture, including its security policies, risk register,
and enterprise architecture. With this information, organizations can develop an information security
program that is aligned to the organization’s business objectives.

59
Q
  1. Which of the following is the MOST important requirement for a successful security program?

A. Mapping security processes to baseline security standards
B. Penetration testing on key systems
C. Management decision on asset value
D. Nondisclosure agreements (NDA) with employees

A

Answer: C

Explanation: “A successful security program requires management support and involvement. One of the
key aspects of management support is to decide on the value of assets and the acceptable level of risk for
them. This will help define the security objectives and priorities for the program. The other options are
possible activities within a security program, but they are not as important as management decision on
asset value.”

60
Q
  1. The PRIMARY objective of a post-incident review of an information security incident is to:

A. update the risk profile
B. minimize impact
C. prevent recurrence.
D. determine the impact

A

Answer: C

Explanation: post-incident review of an information security incident is a process that aims to identify the
root causes, contributing factors, and lessons learned from the incident, and to implement corrective and
preventive actions to avoid or mitigate similar incidents in the future. The primary objective of a
post-incident review is to prevent recurrence, as it helps to improve the security posture, awareness, and
resilience of the organization. Preventing recurrence also helps to reduce the impact and cost of future
incidents, as well as to enhance the reputation and trust of the organization. Updating the risk profile,
minimizing impact, and determining the impact are not the primary objectives of a post-incident review,
although they may be part of its outcomes or outputs. References = CISM Review Manual, 16th Edition,
page 1011

61
Q
  1. Which of the following would be MOST effective in gaining senior management approval of security
    investments in network infrastructure?

A. Performing penetration tests against the network to demonstrate business vulnerability
B. Highlighting competitor performance regarding network best security practices
C. Demonstrating that targeted security controls tie to business objectives
D. Presenting comparable security implementation estimates from several vendors

A

Answer: C

Explanation: The most effective way to gain senior management approval of security investments in
network infrastructure is by demonstrating that targeted security controls tie to business objectives.
Security investments should be tied to business objectives and should support the overall goals of the
organization. By demonstrating that the security controls will directly support the organization’s business
objectives, senior management will be more likely to approve the investment.
According to the Certified Information Security Manager (CISM) Study Manual, To gain senior
management’s approval for investments in security, it is essential to show how the security controls tie to
business objectives and are in support of the overall goals of the organization.

While performing penetration tests against the network, highlighting competitor performance, and
presenting comparable security implementation estimates from vendors are all useful in presenting the
value of security investments, they are not as effective as demonstrating how the security controls will
support the organization’s business objectives.
Reference:
Certified Information Security Manager (CISM) Study Manual, 15th Edition, Page 305.

62
Q
  1. While classifying information assets an information security manager notices that several production
    databases do not have owners assigned to them What is the BEST way to address this situation?

A. Assign responsibility to the database administrator (DBA).
B. Review the databases for sensitive content.
C. Prepare a report of the databases for senior management.
D. Assign the highest classification level to those databases.

A

Answer: A

Explanation: Information asset classification is the process of identifying, labeling, and categorizing
information assets based on their value, sensitivity, and criticality to the organization. Information asset
classification helps to establish appropriate security controls, policies, and procedures for protecting the
information assets from unauthorized access, use, disclosure, modification, or destruction. One of the key
elements of information asset classification is assigning owners to each information asset. Owners are
responsible for managing the information asset throughout its lifecycle, including defining its security
requirements, implementing security controls, monitoring its usage and performance, reporting any
incidents or breaches, and ensuring compliance with legal and regulatory obligations. Therefore, assigning
responsibility to the database administrator (DBA) is the best way to address the situation where several
production databases do not have owners assigned to them. References = CISM Review Manual 15th
Edition1, page 256; Information Asset and Security Classification Procedure2.

63
Q
  1. Which of the following is MOST important to include in an incident response plan to ensure incidents are
    responded to by the appropriate individuals?

A. Skills required for the incident response team
B. A list of external resources to assist with incidents
C. Service level agreements (SLAs)
D. A detailed incident notification process

A

Answer: D

Explanation: A detailed incident notification process is most important to include in an incident response
plan to ensure incidents are responded to by the appropriate individuals. The incident notification process
defines the roles and responsibilities of the incident response team members, the escalation procedures,
the communication channels, the reporting requirements, and the stakeholders to be informed. The incident
notification process helps to ensure that the right people are involved in the incident response, that the
incident is handled in a timely and efficient manner, and that the relevant information is shared with the
appropriate parties. Skills required for the incident response team, a list of external resources to assist with
incidents, and service level agreements (SLAs) are also important elements of an incident response plan,
but they are not as critical as the incident notification process. Skills required for the incident response team
describe the competencies and qualifications of the team members, but they do not specify who should be
notified or involved in the incident response. A list of external resources to assist with incidents provides a
directory of external parties that can provide support or expertise in the incident response, but it does not
define the criteria or process for engaging them. Service level agreements (SLAs) define the expectations
and obligations of the service providers and the service recipients in the incident response, but they do not
detail the steps or procedures for notifying or escalating incidents. References = CISM Review Manual,
16th Edition, pages 191-1921; CISM Review Questions, Answers & Explanations Manual, 10th Edition,
page 662

64
Q
  1. Due to specific application requirements, a project team has been granted administrative ponieon GR: is
    the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these
    users?

A. Clearer segregation of duties
B. Increased user productivity
C. Increased accountability
D. Fewer security incidents

A

Answer: C

Explanation: Increasing accountability is the primary reason for ensuring clearly defined roles and
responsibilities are communicated to users who have been granted administrative privileges due to specific
application requirements. Administrative privileges grant users the ability to perform actions that can affect
the security, availability and integrity of the application or system, such as installing software, modifying
configurations, accessing sensitive data or granting access to other users. Therefore, users who have
administrative privileges must be aware of their roles and responsibilities and the consequences of their
actions. Communicating clearly defined roles and responsibilities to these users helps to establish
accountability by setting expectations, defining boundaries, assigning ownership and enabling monitoring
and reporting. Accountability also helps to deter misuse or abuse of privileges, ensure compliance with
policies and standards, and facilitate incident response and investigation.
Clearer segregation of duties is a benefit of ensuring clearly defined roles and responsibilities, but it is not
the primary reason. Segregation of duties is a control that aims to prevent or detect conflicts of interest,
errors, fraud or unauthorized activities by separating different functions or tasks among different users or
groups. For example, a user who can create a purchase order should not be able to approve it. Segregation
of duties helps to reduce the risk of unauthorized or inappropriate actions by requiring more than one
person to complete a critical or sensitive process. However, segregation of duties alone does not ensure
accountability, as users may still act in collusion or circumvent the control.
Increased user productivity is a possible outcome of ensuring clearly defined roles and responsibilities, but
it is not the primary reason. User productivity refers to the efficiency and effectiveness of users in
performing their tasks and achieving their goals. By communicating clearly defined roles and
responsibilities, users may have a better understanding of their tasks, expectations and performance
indicators, which may help them to work faster, smarter and better. However, user productivity is not
directly related to the security risk of granting administrative privileges, and it may also depend on other
factors, such as user skills, motivation, tools and resources.
Fewer security incidents is a desired result of ensuring clearly defined roles and responsibilities, but it is not
the primary reason. Security incidents are events or situations that compromise the confidentiality, integrity
or availability of information assets or systems. By communicating clearly defined roles and responsibilities,
users may be more aware of the security implications of their actions and the potential threats and
vulnerabilities they may face, which may help them to avoid or prevent security incidents. However, fewer
security incidents is not a guarantee or a measure of accountability, as users may still cause or experience
security incidents due to human error, negligence, malicious intent or external factors. References =
✑ CISM Review Manual 15th Edition, page 144
✑ Effective User Access Reviews - ISACA1
✑ CISM ITEM DEVELOPMENT GUIDE - ISACA2

65
Q
  1. Which of the following is the BEST way to obtain support for a new organization-wide information security
    program?

A. Benchmark against similar industry organizations
B. Deliver an information security awareness campaign.
C. Publish an information security RACI chart.
D. Establish an information security strategy committee.

A

Answer: D

Explanation: = Establishing an information security strategy committee is the best way to obtain support for
a new organization-wide information security program because it involves the participation and
collaboration of key stakeholders from different business functions and levels who can provide input,
guidance, and endorsement for the security program. An information security strategy committee is a
governance body that oversees the development, implementation, and maintenance of the security
program and aligns it with the organization’s strategic objectives, risk appetite, and culture. An information
security strategy committee can help to obtain support for the security program by:
✑ Communicating the vision, mission, and goals of the security program to the
organization and demonstrating its value and benefits.
✑ Establishing roles and responsibilities for the security program and ensuring accountability and
ownership.
✑ Securing adequate resources and budget for the security program and allocating them appropriately.
✑ Resolving conflicts and issues that may arise during the security program execution and ensuring
alignment with other business processes and initiatives.
✑ Monitoring and evaluating the performance and effectiveness of the security program and ensuring
continuous improvement and adaptation.
Benchmarking against similar industry organizations is a useful technique to compare and improve the
security program, but it is not the best way to obtain support for a new organization-wide information
security program. Benchmarking involves measuring and analyzing the security program’s processes,
practices, and outcomes against those of other organizations that have similar characteristics, objectives,
or challenges. Benchmarking can help to identify gaps, strengths, weaknesses, opportunities, and threats
in the security program and to adopt best practices and standards that can enhance the security program’s
performance and maturity. However, benchmarking alone does not guarantee the support or acceptance of
the security program by the organization, as it may not reflect the organization’s specific needs, risks, or
culture.
Delivering an information security awareness campaign is a vital component of the security program, but it
is not the best way to obtain support for a new organization-wide information security program. An
information security awareness campaign is a set of activities and initiatives that aim to educate and inform
the organization’s workforce and other relevant parties about the security program’s policies, standards,
procedures, and guidelines, as well as the security risks, threats, and incidents that may affect the
organization. An information security awareness campaign can help to increase the security knowledge,
skills, and behaviors of the organization’s members and to foster a security risk-aware culture. However, an
information security awareness campaign is not sufficient to obtain support for the security program, as it
may not address the strategic, operational, or financial aspects of the security program or the expectations
and interests of the different stakeholders.
Publishing an information security RACI chart is a helpful tool to define and communicate the security
program’s roles and responsibilities, but it is not the best way to obtain support for a new organization-wide
information security program. A RACI chart is a matrix that assigns the level of involvement and
accountability for each task or activity in the security
program to each role or stakeholder. RACI stands for Responsible, Accountable, Consulted, and Informed,
which are the four possible levels of participation. A RACI chart can help to clarify the expectations,
obligations, and authority of each role or stakeholder in the security program and to avoid duplication,
confusion, or conflict. However, a RACI chart does not ensure the support or commitment of the roles or
stakeholders for the security program, as it may not address the benefits, challenges, or resources of the
security program or the feedback and input of the roles or stakeholders. References =
✑ CISM Review Manual 15th Edition, pages 97-98, 103-104, 107-108, 111-112
✑ Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd
Edition - ISACA1
✑ Information Security Strategy: The Key to Success - ISACA2
Deliver an information security awareness campaign is the BEST approach to obtain support for a new
organization-wide information security program. An information security awareness campaign is a great
way to raise awareness of the importance of information security and the impact it can have on an
organization. It helps to ensure that all stakeholders understand the importance of information security and
are aware of the risks associated with it. Additionally, an effective awareness campaign can help to ensure
that everyone in the organization is aware of the cybersecurity policies, procedures, and best practices that
must be followed.

66
Q
  1. The PRIMARY purpose for continuous monitoring of security controls is to ensure:

A. control gaps are minimized.
B. system availability.
C. effectiveness of controls.
D. alignment with compliance requirements.

A

Answer: C

Explanation: The primary purpose for continuous monitoring of security controls is to ensure the
effectiveness of controls. This involves regularly assessing the controls to ensure that they are meeting
their intended objectives, and that any potential weaknesses are identified and addressed. Continuous
monitoring also helps to ensure that control gaps are minimized, and that systems are available and aligned
with compliance requirements. The primary purpose of continuous monitoring of security controls is to
ensure that the controls are operating effectively and providing adequate protection for the information
assets. Continuous monitoring can also help to identify control gaps, ensure system availability, and
support compliance requirements, but these are secondary benefits12 References = 1: SP 800-137,
Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations,
page 1-12: A Practical Approach to Continuous Control Monitoring, ISACA Journal, Volume 2, 2015, page
1.

67
Q
  1. Which of the following is the sole responsibility of the client organization when adopting a Software as a
    Service (SaaS) model?

A. Host patching
B. Penetration testing
C. Infrastructure hardening
D. Data classification

A

Answer: D

Explanation: Data classification is the sole responsibility of the client organization when adopting a
Software as a Service (SaaS) model. Data classification is the process of categorizing data based on its
sensitivity, value and criticality to the organization. Data classification helps to determine the appropriate
level of protection, access control and retention for different types of dat
A. Data classification is an essential
part of data governance and risk management, as it enables the organization to comply with legal and
regulatory requirements, protect its intellectual property and reputation, and optimize its data storage and
usage costs.
In a SaaS model, the client organization has the least control and responsibility over the cloud infrastructure,
platform and application, as these are fully managed by the cloud service provider (CSP). The client
organization only has control and responsibility over its own data and users. Therefore, the client
organization is responsible for defining and implementing data classification policies and procedures, and
ensuring that its data is properly labeled and handled according to its classification level. The client
organization is also responsible for educating its users about the importance of data classification and the
best practices for data security and privacy.
The other options are not the sole responsibility of the client organization in a SaaS model, as they are
either shared with or delegated to the CSP. Host patching, penetration testing and infrastructure hardening
are all related to the security and maintenance of the cloud infrastructure and platform, which are the
responsibility of the CSP in a SaaS model. The CSP is expected to provide regular updates, patches and
fixes to the host operating system, network and application components, and to conduct periodic security
assessments and audits to identify and remediate any vulnerabilities or weaknesses in the cloud
environment. The client organization may have some responsibility to monitor and verify the CSP’s
performance and compliance with the service level agreement (SLA) and the cloud security standards and
regulations, but it does not have direct control or access to the cloud infrastructure and platform.
References =
✑ Understanding the Shared Responsibilities Model in Cloud Services - ISACA, Figure 1
✑ CISM Review Manual, Chapter 3, page 121

68
Q
  1. A Seat a-hosting organization’s data center houses servers, appli
    BEST approach for developing a physical access control policy for the organization?

A. Review customers’ security policies.
B. Conduct a risk assessment to determine security risks and mitigating controls.
C. Develop access control requirements for each system and application.
D. Design single sign-on (SSO) or federated access.

A

Answer: B

Explanation: = The best approach for developing a physical access control policy for the organization is to
conduct a risk assessment to determine the security risks and mitigating controls that are relevant and
appropriate for the organization’s data center. A risk assessment is a process of identifying, analyzing, and
evaluating the information security risks that could affect the availability, integrity, or confidentiality of the
servers, applications, and data that are hosted in the data center. A risk assessment can help to determine
the likelihood and impact of the unauthorized or inappropriate physical access to the data center, such as
theft, damage, sabotage, or espionage, and the potential consequences for the organization and its
customers, such as service disruption, data loss, data breach, or legal liability. A risk assessment can also
help to identify and prioritize the appropriate risk treatment options, such as implementing technical,
administrative, or physical controls to prevent, detect, or respond to the physical access incidents, such as
locks, alarms, cameras, guards, badges, or logs. A risk assessment can also help to communicate and
report the risk level and status to the senior management and the relevant stakeholders, and to provide
feedback and recommendations for improvement and optimization of the physical access control policy and
the risk management process.
Reviewing customers’ security policies, developing access control requirements for each system and
application, and designing single sign-on (SSO) or federated access are all possible steps that the
organization can take after conducting the risk assessment, but they are not the best ones. Reviewing
customers’ security policies is a process of understanding and complying with the customers’ expectations
and requirements for the security of their servers, applications, and data that are hosted in the data center,
and ensuring that the organization’s physical access control policy is consistent and compatible with them.
Developing access control requirements for each system and application is a process of
defining and implementing the specific rules and criteria for granting or denying the physical access to the
servers and applications that are hosted in the data center, based on the roles, responsibilities, and
privileges of the users, and the sensitivity and criticality of the systems and applications. Designing single
sign-on (SSO) or federated access is a process of enabling and facilitating the authentication and
authorization of the users who need to access the servers and applications that are hosted in the data
center, by using a single or shared identity and credential across multiple systems and domains.
References = CISM Review Manual 15th Edition, pages 51-531; CISM Practice Quiz, question 1542

69
Q
  1. Which of the following should an information security manager do FIRST when a mandatory security
    standard hinders the achievement of an identified business objective?

A. Revisit the business objective.
B. Escalate to senior management.
C. Perform a cost-benefit analysis.
D. Recommend risk acceptance.

A

Answer: B

Explanation: Escalate to senior management, because this could help the information security manager to
inform the decision-makers of the situation, explain the implications and trade-offs, and seek their guidance
and approval for the next steps2. However, this answer is not certain, and you might need to consider other
factors as well.

70
Q
  1. Which of the following is the MOST critical factor for information security program success?

A. comprehensive risk assessment program for information security
B. The information security manager’s knowledge of the business
C. Security staff with appropriate training and adequate resources
D. Ongoing audits and addressing open items

A

Answer: B

Explanation:
The explanation given in the manual is:
The information security manager’s knowledge of the business is the most critical factor for information
security program success because it enables him or her to align security objectives with business goals and
communicate effectively with senior management and other stakeholders. The other choices are important
elements of an information security program but not as critical as the information security manager’s
knowledge of the business.
An information security program is a set of policies, procedures, standards, guidelines, and tools that aim to
protect an organization’s information assets from threats and ensure compliance with laws and regulations.
An information security manager is a professional who oversees and coordinates the implementation and
maintenance of an information security program. An information security manager should have a good
understanding of the business environment, culture, strategy, processes, and needs of an organization to
ensure that security supports its objectives.

71
Q
  1. A newly appointed information security manager of a retailer with multiple stores discovers an HVAC
    (heating, ventilation, and air conditioning) vendor has remote access to the stores to enable real-time
    monitoring and equipment diagnostics. Which of the following should be the information security manager’s
    FIRST course of action?

A. Conduct a penetration test of the vendor.
B. Review the vendor’s technical security controls
C. Review the vendor contract
D. Disconnect the real-time access

A

Answer: C

Explanation: Reviewing the vendor contract should be the information security manager’s first course of
action when discovering an HVAC vendor has remote access to the stores to enable real-time monitoring
and equipment diagnostics. The vendor contract should specify the terms and conditions of the vendor’s
access to the retailer’s network, such as the scope, purpose, duration, frequency, and method of access.
The vendor contract should also define the roles and responsibilities of both parties regarding security,
privacy, compliance, liability, and incident response. Reviewing the vendor contract will help the information
security manager to understand the contractual obligations and expectations of both parties, and to identify
any gaps or issues that need to be addressed or resolved1.
The other options are not the first course of action for the information security manager when discovering
an HVAC vendor has remote access to the stores. Conducting a penetration test of the vendor may be a
useful way to assess the vendor’s security posture and potential vulnerabilities, but it should be done with
the vendor’s consent and cooperation, and after reviewing the vendor contract2. Reviewing the vendor’s
technical security controls may be a necessary step to verify the vendor’s compliance with security
standards and best practices, but it should be done after reviewing the vendor contract and in accordance
with the agreed-upon audit procedures3. Disconnecting the real-time access may be a drastic measure that
could disrupt the vendor’s service delivery and violate the vendor contract, unless there is a clear and
imminent threat or breach that warrants such action. References: 1: Vendor Access: Addressing the
Security Challenge with Urgency - BeyondTrust 2: Penetration Testing - NIST 3: Reduce Risk from Third
Party Access | BeyondTrust : Third-Party Vendor Security Risk Management & Prevention

72
Q
  1. Which of the following is the BEST approach to make strategic information security decisions?

A. Establish regular information security status reporting.
B. Establish an information security steering committee.
C. Establish business unit security working groups.
D. Establish periodic senior management meetings.

A

Answer: B

Explanation: = According to the CISM Review Manual (Digital Version), page 9, an information security
steering committee is a group of senior managers from different business units and functions who provide
guidance and oversight for the information security program. An information security steering committee is
the best approach to make strategic information security decisions because it can:
✑ Ensure alignment of information security strategy with business objectives and risk
appetite1
✑ Facilitate communication and collaboration among different stakeholders and promote information
security awareness and culture2
✑ Provide direction and support for information security initiatives and projects3
✑ Monitor and review the performance and effectiveness of the information security program4
✑ Resolve conflicts and issues related to information security policies and practices5
Establishing regular information security status reporting, business unit security working groups, and
periodic senior management meetings are useful activities for information security management, but they
are not sufficient to make strategic information security decisions without the involvement and guidance of
an information security steering committee. References = 1: CISM Review Manual (Digital Version), page
9 2: 1 3: 2 4: 3 5: 4
An Information Security Steering Committee is a group of stakeholders responsible for providing
governance and guidance to the organization on all matters related to information security. The committee
provides oversight and guidance on security policies, strategies, and technology implementation. It also
ensures that the organization is in compliance with relevant laws and regulations. Additionally, it serves as
a forum for discussing security- related issues and ensures that security is taken into account when making
strategic decisions.

73
Q
  1. The PRIMARY objective of performing a post-incident review is to:

A. re-evaluate the impact of incidents
B. identify vulnerabilities
C. identify control improvements.
D. identify the root cause.

A

Answer: D

Explanation: = The PRIMARY objective of performing a post-incident review is to identify the root cause of
the incident, which is the underlying factor or condition that enabled the incident to occur. Identifying the
root cause helps to prevent or mitigate future incidents, as well as to improve the incident response process.
Re-evaluating the impact of incidents, identifying vulnerabilities, and identifying control improvements are
secondary objectives of a post-incident review, which are derived from the root cause analysis. References
= CISM Review Manual, 16th Edition, page 3061; CISM Review Questions, Answers & Explanations
Manual, 10th Edition, page 1512
The primary objective of performing a post-incident review is to identify the root cause of the incident. After
an incident has occurred, the post-incident review process involves gathering and analyzing evidence to
determine the cause of the incident. This analysis will help to identify both the underlying vulnerability that
allowed the incident to occur, as well as any control improvements that should be implemented to prevent
similar incidents from occurring in the future. Additionally, the post-incident review process can also be
used to re-evaluate the impact of the incident, as well as any potential implications for the organization.

74
Q
  1. The information security manager has been notified of a new vulnerability that affects key data processing
    systems within the organization Which of the following should be done FIRST?

A. Inform senior management
B. Re-evaluate the risk
C. Implement compensating controls
D. Ask the business owner for the new remediation plan

A

Answer: B

Explanation: The first step when a new vulnerability is identified is to re-evaluate the risk associated with
the vulnerability. This may require an update to the risk assessment and the implementation of additional
controls. Informing senior management of the vulnerability is important, but should not be the first step.
Implementing compensating controls may also be necessary, but again, should not be the first step. Asking
the business owner for a remediation plan may be useful, but only after the risk has been re-evaluated.
The information security manager should first re-evaluate the risk posed by the new vulnerability to
determine its impact and likelihood. Based on this assessment, appropriate actions can be taken such as
informing senior management, implementing compensating controls, or requesting a remediation plan from
the business owner. The other choices are possible actions but not necessarily the first one.
A vulnerability is a weakness that can be exploited by an attacker to compromise a system or network2. A
vulnerability can affect key data processing systems within an organization if it exposes sensitive
information, disrupts business operations, or damages assets2. A vulnerability assessment is a process of
identifying and evaluating vulnerabilities and their potential consequences2

75
Q
  1. Which of the following is MOST important to include in monthly information security reports to the board?

A. Trend analysis of security metrics
B. Risk assessment results
C. Root cause analysis of security incidents
D. Threat intelligence

A

Answer: A

Explanation: The most important information to include in monthly information security reports to the board
is the trend analysis of security metrics. Security metrics are quantitative and qualitative measures that
indicate the performance and effectiveness of the information security program and the alignment with the
business objectives. Trend analysis is the process of comparing and evaluating the changes and patterns
of security metrics over time. Trend analysis can help to identify the strengths and weaknesses of the
information security program, the progress and achievements of the security goals and initiatives, the gaps
and opportunities for improvement, and the impact and value of the information security investments. Trend
analysis can also help to communicate the current and future security risks and challenges, and the
recommended actions and strategies to address them. Trend analysis can provide the board with a clear
and concise overview of the information security status and direction, and enable informed and timely
decision making.
References =
✑ CISM Review Manual 15th Edition, page 1631
✑ The CISO’s Guide to Reporting Cybersecurity to the Board2
✑ CISM 2020: Information Security Metrics and Reporting, video 13

76
Q
  1. Which of the following is the BEST approach when creating a security policy for a global organization
    subject to varying laws and regulations?

A. Incorporate policy statements derived from third-party standards and benchmarks.
B. Adhere to a unique corporate privacy and security standard
C. Establish baseline standards for all locations and add supplemental standards as required
D. Require that all locations comply with a generally accepted set of industry

A

Answer: C

Explanation: = Creating a security policy for a global organization subject to varying laws and regulations is
a challenging task, as it requires balancing the need for consistency, compliance, and flexibility. The best
approach is to establish baseline standards for all locations that reflect the organization’s overall security
objectives, principles, and requirements. These standards should be aligned with the organization’s
mission, vision, values, and strategy, as well as with the applicable laws and regulations of each location.
The baseline standards should also be reviewed and updated periodically to ensure their relevance and
effectiveness. Additionally, supplemental standards can be added as required to address specific issues or
risks that may arise in different locations or situations. Supplemental standards should be based on the
best practices and lessons learned from the baseline standards, as well as on the feedback and input from
the stakeholders of each location. References = CISM Review Manual, 16th Edition, page 1001

77
Q
  1. Which of the following is the BEST course of action when an online company discovers a network attack in
    progress?

A. Dump all event logs to removable media
B. Isolate the affected network segment
C. Enable trace logging on ail events
D. Shut off all network access points

A

Answer: B

Explanation: The BEST course of action when an online company discovers a network attack in progress is
to isolate the affected network segment. This prevents the attacker from gaining further access to the
network and limits the scope of the attack. Dumping event logs to removable media and enabling trace
logging may be useful for forensic purposes, but should not be the first course of action in the midst of an
active attack. Shutting off all network access points would be too drastic and would prevent legitimate traffic
from accessing the network.

78
Q
  1. A balanced scorecard MOST effectively enables information security:

A. risk management
B. project management
C. governance
D. performance

A

Answer: C

Explanation: A balanced scorecard enables information security governance by providing a framework for
aligning security objectives with business goals and measuring performance against them. The other
choices are not directly related to governance but may be supported by it.
A balanced scorecard is a strategic management tool that describes the cause-and-effect linkages between
four high-level perspectives of strategy and execution: financial, customer, internal process, and learning
and growth2. It helps organizations communicate and monitor their vision and strategy across different
levels and functions2.

79
Q
  1. An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor.
    What should the information security manager do FIRST to support this initiative?

A. Review independent security assessment reports for each vendor.
B. Benchmark each vendor’s services with industry best practices.
C. Analyze the risks and propose mitigating controls.
D. Define information security requirements and processes.

A

Answer: D

Explanation: Defining information security requirements and processes is the FIRST thing that the
information security manager should do to support the initiative of utilizing Software as a Service (SaaS)
and selecting a vendor. This is because information security requirements and processes provide the basis
for evaluating and comparing the SaaS vendors and solutions, as well as for ensuring the alignment of the
SaaS services with the organization’s security objectives, policies, and standards. Information security
requirements and processes should include aspects such as data protection, access
control, encryption, authentication, authorization, audit, compliance, incident response, disaster recovery,
and service level agreements12. Reviewing independent security assessment reports for each vendor (A)
is a useful thing to do to support the initiative of utilizing SaaS and selecting a vendor, but it is not the FIRST
thing to do. Independent security assessment reports can provide valuable information about the security
posture, practices, and performance of the SaaS vendors and solutions, such as their compliance with
industry standards, frameworks, and regulations, their vulnerability and risk management, and their security
testing and auditing results. However, reviewing independent security assessment reports should be done
after defining the information security requirements and processes, which can help to determine the scope,
criteria, and expectations for the security assessment12. Benchmarking each vendor’s services with
industry best practices (B) is also a useful thing to do to support the initiative of utilizing SaaS and selecting
a vendor, but it is not the FIRST thing to do. Benchmarking each vendor’s services with industry best
practices can help to measure and compare the quality, performance, and value of the SaaS vendors and
solutions, as well as to identify the gaps, strengths, and weaknesses of the SaaS services. However,
benchmarking each vendor’s services with industry best practices should be done after defining the
information security requirements and processes, which can help to select the relevant and appropriate
industry best practices for the SaaS services12. Analyzing the risks and proposing mitigating controls © is
also a useful thing to do to support the initiative of utilizing SaaS and selecting a vendor, but it is not the
FIRST thing to do. Analyzing the risks and proposing mitigating controls can help to identify and evaluate
the potential threats, vulnerabilities, and impacts that may affect the security, availability, and reliability of
the SaaS vendors and solutions, as well as to recommend and implement the necessary measures to
reduce or eliminate the risks. However, analyzing the risks and proposing mitigating controls should be
done after defining the information security requirements and processes, which can help to establish the
risk appetite, tolerance, and criteria for the SaaS
services12. References = 1: CISM Review Manual 15th Edition, page 82-831; 2: How to Evaluate SaaS
Providers and Solutions by Developing RFP Criteria - Gartner2

80
Q
  1. An organization permits the storage and use of its critical and sensitive information on employee-owned
    smartphones. Which of the following is the BEST security control?

A. Establishing the authority to remote wipe
B. Developing security awareness training
C. Requiring the backup of the organization’s data by the user
D. Monitoring how often the smartphone is used

A

Answer: A

Explanation:
The best security control for an organization that permits the storage and use of its critical and sensitive
information on employee-owned smartphones is establishing the authority to remote wipe. Remote wipe is
a feature that allows an authorized administrator or user to remotely erase the data on a device in case of
loss, theft, or compromise1. Remote wipe can help prevent unauthorized access or disclosure of the
organization’s information on employee-owned smartphones, as well as protect the privacy of the
employee’s personal dat
A. Remote wipe can be implemented through various methods, such as mobile
device management (MDM) software, native device features, or third-party applications2. However, remote
wipe requires the consent and cooperation of the employee, as well as a clear policy that defines the
conditions and procedures for its use. The other options are not the best security controls for an
organization that permits the storage and use of its critical and sensitive information on employee-owned
smartphones. Developing security awareness training is an important measure to educate employees
about the security risks and responsibilities associated with using their own smartphones for work purposes,
but it does not provide a technical or physical protection for the data on the devices3. Requiring the backup
of the organization’s data by the user is a good practice to ensure data availability and recovery in case of
device failure or loss, but it does not prevent unauthorized access or disclosure of the data on the devices4.
Monitoring how often the smartphone is used is a possible way to detect abnormal or suspicious activities
on the devices, but it does not prevent or mitigate the impact of a data breach on the devices. References:
4: Mobile Device Backup - NIST 3: Security Awareness Training - NIST 1: Remote Wipe - Lifewire 2: How
Businesses with a BYOD Policy Can Secure Employee Devices - IBM : Mobile Device Security Policy –
SANS

81
Q
  1. Which of the following is the BEST approach to incident response for an organization migrating to a
    cloud-based solution?

A. Adopt the cloud provider’s incident response procedures.
B. Transfer responsibility for incident response to the cloud provider.
C. Continue using the existing incident response procedures.
D. Revise incident response procedures to encompass the cloud environment.

A

Answer: D

Explanation: The best approach to incident response for an organization migrating to a cloud-based
solution is to revise the existing incident response procedures to encompass the cloud environment. This is
because the cloud environment introduces new challenges and risks that may not be adequately addressed
by the current procedures. For example, the cloud provider may have different roles and responsibilities,
service level agreements, notification and escalation processes, data protection and privacy requirements,
and legal and regulatory obligations than the organization. Therefore, the organization should review and
update its incident response procedures to align with the cloud provider’s policies and practices, as well as
the organization’s business objectives and risk appetite. The organization should also ensure that the
incident response team members are trained and aware of the changes in the procedures and the cloud
environment.
The other options are not the best approaches because they do not consider the specific characteristics
and implications of the cloud environment. Adopting the cloud provider’s incident response procedures may
not be feasible or desirable, as the organization may have different needs and expectations than the cloud
provider. Transferring responsibility for incident response to the cloud provider may not be possible or
advisable, as the organization may still retain some accountability and liability for the security and
availability of its data and services in the cloud. Continuing to use the existing incident response procedures
may not be effective or efficient, as the procedures may not cover the scenarios and issues that may arise
in the cloud environment. References =
✑ CISM Review Manual (Digital Version) 1, Chapter 4: Information Security Incident
Management, pages 191-192, 195-196, 199-200.
✑ Cloud Incident Response Framework – A Quick Guide 2, pages 3-4, 6-7, 9-10.
✑ CISM ITEM DEVELOPMENT GUIDE 3, page 18, Question 1.

82
Q
  1. An organization’s disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which
    of the following is the BEST way to ensure the plan can be carried out in an emergency?

A. Store disaster recovery documentation in a public cloud.
B. Maintain an outsourced contact center in another country.
C. Require disaster recovery documentation be stored with all key decision makers.
D. Provide annual disaster recovery training to appropriate staff.

A

Answer: D

Explanation: = The best way to ensure that the disaster recovery plan (DRP) can be carried out in an
emergency is to provide annual disaster recovery training to the appropriate staff, such as the disaster
recovery team, the business process owners, and the IT staff. Disaster recovery training is a process of
educating and preparing the staff for their roles, responsibilities, and actions in the event of a disaster that
affects the availability, integrity, or confidentiality of the information assets and systems that support the
business processes and functions. Disaster recovery training can help to ensure that the staff are aware,
capable, and confident to execute the DRP, as well as to minimize the impact and damage to the business
continuity, reputation, and value. Disaster recovery training can also help to evaluate the adequacy,
accuracy, and applicability of the DRP, as well as to identify and address any gaps, weaknesses, or errors
that could hinder or compromise the disaster recovery process. Disaster recovery training can also help to
document and report the training details, activities, and outcomes, and to provide feedback and
recommendations for improvement and optimization of the DRP and the training process. Storing disaster
recovery documentation in a public cloud, maintaining an outsourced contact center in another country, and
requiring disaster recovery documentation be stored with all key decision makers are all possible ways to
ensure the availability and accessibility of the DRP in an emergency, but they are not the best ones. Storing
disaster recovery documentation in a public cloud is a process of using a third-party service provider to
store and manage the DRP documents online, which can offer benefits such as scalability, flexibility, and
cost-efficiency, but also risks such as data breach, data loss, or service disruption. Maintaining an
outsourced contact center in another country is a process of using a third-party service provider to handle
the communication and coordination of the disaster recovery process with the internal and external
stakeholders, such as the customers, partners, or regulators, which can offer benefits such as redundancy,
reliability, and expertise, but also risks such as cultural, legal, or contractual issues. Requiring disaster
recovery documentation be stored with all key decision makers is a process of ensuring that the senior
management and the business process owners have a copy of the DRP documents, which can offer
benefits such as accountability, authority, and visibility, but also risks such as inconsistency, duplication, or
unauthorized access. References = CISM Review Manual 15th Edition, pages 233-2341; CISM Practice
Quiz, question 1602

83
Q
  1. Which of the following BEST determines the allocation of resources during a security incident response?

A. Senior management commitment
B. A business continuity plan (BCP)
C. An established escalation process
D. Defined levels of severity

A

Answer: D

Explanation: = The allocation of resources during a security incident response depends on the defined
levels of severity, which indicate the potential impact and urgency of the incident. The levels of severity help
prioritize the response activities and assign the appropriate roles and responsibilities. Senior management
commitment, a business continuity plan (BCP), and an established escalation process are important factors
for an effective incident response, but they do not directly determine the allocation of
resources. References = CISM Review Manual, 16th Edition, page 3011; CISM Review Questions,
Answers & Explanations Manual, 10th Edition, page 1462
Learn more: 1. isac
A.org2. amazon.com3. gov.uk
Defined levels of severity is the best determinant of the allocation of resources during a security incident
response. Having defined levels of severity allows organizations to plan for and allocate resources for each
level of incident, depending on the severity of the incident. This ensures that the right resources are
allocated in a timely manner and that incidents are addressed appropriately.

84
Q
  1. An organization’s quality process can BEST support security management by providing:

A. security configuration controls.
B. assurance that security requirements are met.
C. guidance for security strategy.
D. a repository for security systems documentation.

A

Answer: B

Explanation: = A quality process is a set of activities that ensures that the products or services delivered by
an organization meet the customer’s expectations and comply with the applicable standards and
regulations. A quality process can support security management by providing assurance that security
requirements are met throughout the development, implementation and maintenance of information
systems and processes. A quality process can also help to identify and correct security defects, measure
security performance and effectiveness, and improve security practices and procedures. References =
CISM Review Manual, 15th Edition, page 671; CISM Review Questions, Answers & Explanations Database,
question ID 2092.
An organization’s quality process can BEST support security management by providing assurance that
security requirements are met. This means that the quality process can be used to ensure that security
controls are being implemented as intended and that they are achieving the desired results. This helps to
ensure that the organization is properly protected and that it is in compliance with security regulations and
standards.

85
Q
  1. Which of the following is the BEST indication of information security strategy alignment with the “&

A. Percentage of information security incidents resolved within defined service level agreements (SLAs)
B. Percentage of corporate budget allocated to information security initiatives
C. Number of business executives who have attended information security awareness sessions
D. Number of business objectives directly supported by information security initiatives

A

Answer: D

Explanation: The number of business objectives directly supported by information security initiatives is the
best indication of information security strategy alignment with the organizational goals and objectives. This
metric shows how well the information security strategy is aligned with the business strategy, and how
effectively the information security program is delivering value to the organization. The more business
objectives that are supported by information security initiatives, the more aligned the information security
strategy is with the organizational goals and objectives.
The other options are not the best indicators of information security strategy alignment, as they do not
directly measure the impact or contribution of information security initiatives to the business objectives. The
percentage of information security incidents resolved within defined SLAs is a measure of the efficiency and
effectiveness of the incident management process, but it does not reflect how well the information security
strategy is aligned with the business strategy. The percentage of corporate budget allocated to information
security initiatives is a measure of the investment and commitment of the organization to information
security, but it does not indicate how well the information security initiatives are aligned with the business
objectives or how they are prioritized. The number of business executives who have attended information
security awareness sessions is a measure of the awareness and involvement of the senior management in
information security, but it does not show how well the information security strategy is aligned with the
business strategy or how it supports the business objectives. References =
✑ CISM Exam Content Outline | CISM Certification | ISACA, Domain 1, Task 1.1
✑ CISM MASTER CHEAT SHEET - SkillCertPro, Chapter 1, page 2
✑ Certified Information Security Manager (CISM), page 1
✑ Certified Information Security Manager Exam Prep Guide: Aligned with …, page 1
✑ CISM: Certified Information Security SKILLS COVERED Manager, page 1

86
Q
  1. The PRIMARY objective of performing a post-incident review is to:

A. re-evaluate the impact of incidents.
B. identify vulnerabilities.
C. identify control improvements.
D. identify the root cause.

A

Answer: D

Explanation: = The primary objective of performing a post-incident review is to identify the root cause of the
incident, which is the underlying factor or condition that enabled or facilitated the occurrence of the incident.
Identifying the root cause helps to understand the nature and origin of the incident, and to prevent or
mitigate similar incidents in the future. A post-incident review also aims to evaluate the effectiveness and
efficiency of the incident response process, identify lessons learned and best practices, and recommend
improvements for the incident management policies, procedures, controls, and tools. However, these are
secondary objectives that depend on the identification of the root cause as the first step.
Re-evaluating the impact of incidents is not the primary objective of performing a post- incident review, as it
is already done during the incident response process. The impact of incidents is the extent and severity of
the damage or harm caused by the incident to the organization’s assets, operations, reputation, or
stakeholders. Re-evaluating the impact of incidents may be part of the post-incident review, but it is not the
main goal.
Identifying vulnerabilities is not the primary objective of performing a post-incident review, as it is also done
during the incident response process. Vulnerabilities are weaknesses or flaws in the system or network that
can be exploited by attackers to compromise the confidentiality, integrity, or availability of the information or
resources. Identifying vulnerabilities may be part of the post-incident review, but it is not the main goal.
Identifying control improvements is not the primary objective of performing a post-incident review, as it is a
result of the root cause analysis. Controls are measures or mechanisms that are implemented to protect the
system or network from threats, reduce risks, or ensure compliance with policies and standards. Identifying
control improvements is an important outcome of the post-incident review, but it is not the main goal.
References =
✑ ISACA CISM: PRIMARY goal of a post-incident review should be to?
✑ CISM Exam Overview - Vinsys
✑ CISM Review Manual, Chapter 4, page 176
✑ CISM Exam Content Outline | CISM Certification | ISACA, Domain 4, Task 4.3

87
Q
  1. Which of the following is MOST important to include in a report to key stakeholders regarding the
    effectiveness of an information security program?

A. Security metrics
B. Security baselines
C. Security incident details
D. Security risk exposure

A

Answer: A

Explanation:
Security metrics are the most important to include in a report to key stakeholders regarding the
effectiveness of an information security program because they provide objective and measurable evidence
of security performance and progress. Security metrics can include measures such as the number and
severity of security incidents, the level of compliance with security policies and standards, the effectiveness
of security controls, and the return on investment (ROI) of security initiatives. The other choices may also
be included in a security report, but security metrics are the most important.
An information security program is a set of policies, procedures, standards, guidelines, and tools that aim to
protect an organization’s information assets from threats and ensure compliance with laws and regulations.
The effectiveness of an information security program depends on various factors, such as the
organization’s risk appetite, business objectives, resources, culture, and external environment. Regular
reporting to key stakeholders, such as senior management, the board of directors, and business partners,
is critical to maintaining their support and buy-in for the program. The report should provide clear and
concise information on the program’s status, achievements, challenges, and future plans, and it should be
tailored to the audience’s needs and expectations.

88
Q
  1. Which of the following is the responsibility of a risk owner?

A. Implementing risk treatment plan activities with control owners
B. Evaluating control effectiveness
C. Approving risk treatment plans
D. Approving the selection of risk mitigation measures

A

Answer: C

Explanation:
A risk owner is a person or entity that is responsible for ensuring that risk is managed effectively. One of the
primary responsibilities of a risk owner is to implement controls that will help mitigate or manage the risk.
While risk assessments, determining the organization’s risk appetite, and monitoring control effectiveness
are all important aspects of managing risk, it is the responsibility of the risk owner to take the necessary
actions to manage the risk.

89
Q
  1. When performing a business impact analysis (BIA), who should be responsible for determining the initial
    recovery time objective (RTO)?

A. External consultant
B. Information owners
C. Information security manager
D. Business continuity coordinator

A

Answer: B

Explanation: Information owners are responsible for determining the initial recovery time objective (RTO)
for their information assets and processes, as they are the ones who understand the business requirements
and impact of a disruption. An external consultant may assist in conducting the business impact analysis
(BIA), but does not have the authority to decide the RTO. An information security manager may provide
input on the security aspects of the RTO, but does not have the business perspective to determine the RTO.
A business continuity coordinator may facilitate the BIA process and ensure the alignment of the RTO with
the business continuity plan, but does not have the ownership of the information assets and processes.
References = CISM Review Manual 15th Edition, page 202.
When performing a business impact analysis (BIA), it is the responsibility of the business continuity
coordinator to determine the initial recovery time objective (RTO). The RTO is a critical component of the
BIA and should be determined in cooperation with the information owners. The RTO should reflect the
maximum tolerable period of disruption (MTPD) and should be used to guide the development of the
recovery strategy.

90
Q
  1. Which of the following events would MOST likely require a revision to the information security program?

A. An increase in industry threat level .
B. A significant increase in reported incidents
C. A change in IT management
D. A merger with another organization

A

Answer: D

Explanation: = A merger with another organization would MOST likely require a revision to the information
security program, because it involves a significant change in the scope, structure, and objectives of the
organization. A merger could affect the information security policies, procedures, roles, responsibilities, and
resources of the organization, as well as introduce new risks and challenges. Therefore, the information
security program should be reviewed and updated to reflect the new situation and ensure alignment with
the organizational goals and strategies. An increase in industry threat level, a significant increase in
reported incidents, and a change in IT management are all events that could affect the information security
program without necessarily requiring a revision. References = CISM Review Manual, 16th Edition, page
3181; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 1532

91
Q
  1. Which of the following will provide the MOST guidance when deciding the level of protection for an
    information asset?

A. Impact on information security program
B. Cost of controls
C. Impact to business function
D. Cost to replace

A

Answer: C

Explanation: The level of protection for an information asset should be based on the impact to the business
function that depends on the asset. The impact to the business function reflects the value and criticality of
the information asset to the organization, and the potential consequences of its loss, compromise, or
unavailability. The impact to the business function can be measured in terms of financial, operational,
reputational, legal, or strategic effects. The higher the impact, the higher the level of protection required.
Impact on information security program, cost of controls, and cost to replace are not the best factors to
provide guidance when deciding the level of protection for an information asset. Impact on information
security program is a secondary effect that depends on the impact to the business function. Cost of controls
and cost to replace are important considerations for implementing and maintaining the protection, but they
do not determine the level of protection needed. Cost of controls and cost to replace should be balanced
with the impact to the business function and the risk appetite of the organization. References = CISM
Certified Information Security Manager Study Guide, Chapter 2: Information Risk Management, page 671;
CISM Foundations: Module 2 Course, Part One: Information Risk Management2; CISM Review Manual
15th Edition, Chapter 2: Information Risk Management, page 693
When deciding the level of protection for an information asset, the most important factor to consider is the
impact to the business function. The value of the asset should be evaluated in terms of its importance to the
organization’s operations and how its security posture affects the organization’s overall security posture.
Additionally, the cost of implementing controls, the potential impact on the information security program,
and the cost to replace the asset should be taken into account when determining the appropriate level of
protection for the asset.

92
Q
  1. Recovery time objectives (RTOs) are BEST determined by:

A. business managers
B. business continuity officers
C. executive management
D. database administrators (DBAs).

A

Answer: A

Explanation: Business managers are best suited to determine the recovery time objectives (RTOs) for their
business processes and functions, as they have the knowledge and authority to assess the impact of
downtime and the acceptable level of service continuity. RTOs are the maximum acceptable time that a
business process or function can be disrupted before it causes significant harm to the organization’s
objectives, reputation, or compliance. References = CISM Review Manual, 16th Edition, Chapter 5, Section
5.2.1.11

93
Q
  1. Which of the following is the BEST technical defense against unauthorized access to a corporate network
    through social engineering?

A. Requiring challenge/response information
B. Requiring multi factor authentication
C. Enforcing frequent password changes
D. Enforcing complex password formats

A

Answer: B

Explanation: Social engineering is a technique used by attackers to manipulate individuals into divulging
sensitive information or performing actions that can compromise the security of an organization. Multi-factor
authentication (MFA) is a security mechanism that requires users to provide at least two forms of
authentication to verify their identity. By requiring MFA, even if an attacker successfully obtains a user’s
credentials through social engineering, they will not be able to access the network without the additional
form of authentication.

94
Q
  1. The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness
    training program is to include:

A. results of exit interviews.
B. previous training sessions.
C. examples of help desk requests.
D. responses to security questionnaires.

A

Answer: C

Explanation: The best way to ensure that frequently encountered incidents are reflected in the user security
awareness training program is to include examples of help desk requests. Help desk requests are requests
for assistance or support from users who encounter problems or issues related to information security, such
as password resets, malware infections, phishing emails, unauthorized access, data loss, or system errors.
Help desk requests can provide valuable insights into the types, frequencies, and impacts of the incidents
that affect the users, as well as the users’ knowledge, skills, and behaviors regarding information security.
By including examples of help desk requests in the user security awareness training program, the
information security manager can achieve the following benefits12:
✑ Increase the relevance and effectiveness of the training content: By using real-life scenarios and cases
that the users have experienced or witnessed, the information security manager can make the training
content more relevant, engaging, and applicable to the users’ needs and situations. The information
security manager can also use the examples of help desk requests to illustrate the consequences and
costs of the incidents, and to highlight the best practices and solutions to prevent or resolve them. This can
help the users to understand the importance and value of information security, and to improve their
knowledge, skills, and attitudes accordingly.
✑ Identify and address the gaps and weaknesses in the training program: By analyzing the patterns and
trends of the help desk requests, the information security manager can identify and address the gaps and
weaknesses in the existing training program, such as outdated or inaccurate information, insufficient or
ineffective coverage of topics, or lack of feedback or evaluation. The information security manager can also
use the examples of help desk requests to measure and monitor the impact and outcomes of the training
program, such as changes in the number, type, or severity of the incidents, or changes in the users’
satisfaction, performance, or behavior.
✑ Enhance the communication and collaboration with the users and the help desk staff: By including
examples of help desk requests in the user security awareness training program, the information security
manager can enhance the communication and collaboration with the users and the help desk staff, who are
the key stakeholders and partners in information security. The information security manager can use the
examples of help desk requests to solicit feedback, suggestions, or questions from the users and the help
desk staff, and to provide them with timely and relevant information, guidance, or support. The information
security manager can also use the examples of help desk requests to recognize and appreciate the efforts
and contributions of the users and the help desk staff in reporting, responding, or resolving the incidents,
and to encourage and motivate them to continue their involvement and participation in information security.
The other options are not the best way to ensure that frequently encountered incidents are reflected in the
user security awareness training program, as they are less reliable, relevant, or effective sources of
information. Results of exit interviews are feedback from employees who are leaving the organization, and
they may not reflect the current or future incidents that the remaining or new employees may face. Previous
training sessions are records of the past training activities, and they may not capture the changes or
updates in the information security environment, threats, or requirements. Responses to security
questionnaires are answers to predefined questions or surveys, and they may not cover all the possible or
emerging incidents that the users may encounter or experience12. References = Information Security
Awareness Training: Best Practices - Infosec Resources, How to Create an Effective Security Awareness
Training Program - Infosec Resources, Security Awareness Training: How to Build a Successful Program -
ISACA, Security Awareness Training: How to Educate Your Employees - ISACA

95
Q
  1. The PRIMARY reason to create and externally store the disk hash value when performing forensic data
    acquisition from a hard disk is to:

A. validate the confidentiality during analysis.
B. reinstate original data when accidental changes occur.
C. validate the integrity during analysis.
D. provide backup in case of media failure.

A

Answer: C

Explanation: The disk hash value is a unique identifier that is calculated from the binary data of the disk. It is
used to verify that the disk image is an exact copy of the original disk and that no changes have occurred
during the acquisition or analysis process. The disk hash value is stored externally, such as on a CD-ROM
or a USB drive, to prevent tampering or corruption. The disk hash value can also be used as evidence in
court to prove the authenticity and reliability of the digital evidence123 References = 1: CISM Review
Manual 15th Edition, ISACA, 2017, page 2532: Guide to Computer Forensics and Investigations Fourth
Edition, page 4-103: Forensic disk acquisition over the network, Andrea Fortuna, 2018.The main purpose of
creating and storing an external disk hash value when performing forensic data acquisition from a hard disk
is to validate the integrity of the data during the analysis. This is done by comparing the original hash value
of the disk to the hash value created during the acquisition process, which can be used to ensure that the
data has not been tampered with or corrupted in any way. Additionally, by creating a hash value of the disk,
it can be used to quickly verify the integrity of any data that is accessed from the disk in the future.

96
Q
  1. Which of the following is the PRIMARY objective of a business impact analysis (BIA)?

A. Determine recovery priorities.
B. Define the recovery point objective (RPO).
C. Confirm control effectiveness.
D. Analyze vulnerabilities.

A

Answer: A

Explanation: The primary objective of a business impact analysis (BIA) is to determine recovery priorities.
The BIA is used to identify and analyze the potential effects of an incident on the organization, including the
financial impact, operational impact, and reputational impact. The BIA also helps to identify critical
resources and processes, determine recovery objectives and strategies, and develop recovery plans.
Reference: Certified Information Security Manager (CISM) Study Manual, Chapter 4, Business Impact
Analysis.

97
Q
  1. Which of the following factors has the GREATEST influence on the successful implementation of
    information security strategy goals?

A. Regulatory requirements
B. Compliance acceptance
C. Management support
D. Budgetary approval

A

Answer: C

Explanation:
Management support is the factor that has the greatest influence on the successful implementation of
information security strategy goals. Management support refers to the commitment and involvement of
senior executives and other key stakeholders in defining, approving, funding, and overseeing the
information security strategy. Management support is essential for aligning the information security strategy
with the business objectives, ensuring adequate resources and budget, fostering a security-aware culture,
and enforcing accountability and compliance. According to ISACA, management support is one of the
critical success factors for information security governance1. The other options are not factors that
influence the successful implementation of information security strategy goals, but rather outcomes or
components of the information security strategy. Regulatory requirements are external obligations that the
information security strategy must comply with2. Compliance acceptance is the degree to which the
organization adheres to the information security policies and standards3. Budgetary approval is the process
of allocating financial resources for the information security activities and initiatives4. References: 2:
Information Security: Goals, Types and Applications - Exabeam 3: How to develop a cybersecurity strategy:
Step-by-step guide 4: Information Security Goals And Objectives 1: The Importance of Building an
Information Security Strategic Plan

98
Q
  1. Which of the following has the MOST influence on the inherent risk of an information asset?

A. Risk tolerance
B. Net present value (NPV)
C. Return on investment (ROI)
D. Business criticality

A

Answer: D

Explanation: Inherent risk is the risk that exists before any controls are applied. It is influenced by factors
such as the nature, value, sensitivity, and exposure of the information asset. Business criticality is one of
the most important factors that affect the inherent risk of an information asset, as it reflects how essential
the asset is for the organization’s operations and objectives. The higher the business criticality, the higher
the inherent risk. Risk tolerance, NPV, and ROI are not directly related to the inherent risk of an information
asset, as they are more relevant for the risk assessment and risk treatment processes. References = CISM
Review Manual, 16th Edition, page 971Business criticality is the degree to which an asset is essential to the
success of the business and the extent to which its loss or compromise could have a significant impact on
the business. Business criticality is one of the main factors that help to determine the inherent risk of an
asset, as assets that are more critical to the business tend to have a higher inherent risk.

99
Q
  1. What is the PRIMARY objective of performing a vulnerability assessment following a business system
    update?

A. Determine operational losses.
B. Improve the change control process.
C. Update the threat landscape.
D. Review the effectiveness of controls

A

Answer: D

Explanation: The primary objective of performing a vulnerability assessment following a business system
update is to review the effectiveness of controls. A vulnerability assessment is a systematic review of
security weaknesses in an information system. It evaluates if the system is susceptible to any known
vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if
and whenever needed1. A business system update is a process of modifying or enhancing an information
system to improve its functionality, performance, security, or compatibility. A business system update may
introduce new features, fix bugs, patch vulnerabilities, or comply with new standards or regulations2.
Performing a vulnerability assessment following a business system update is important because it helps to:
•Review the effectiveness of controls that are implemented to protect the information sys- tem from threats
and risks
•Identify any new or residual vulnerabilities that may have been introduced or exposed by the update
•Evaluate the impact and likelihood of potential incidents that may exploit the vulnerabili- ties
•Prioritize and implement appropriate actions to address the vulnerabilities
•Verify and validate the security posture and compliance of the updated information sys- tem
Therefore, the primary objective of performing a vulnerability assessment following a business system
update is to review the effectiveness of controls that are designed to ensure the confidentiality, integrity,
and availability of the information system and its dat
A. The other options are not the primary objectives of
performing a vulnerability as-sessment following a business system update. Determining operational losses
is not an objective, but rather a possible consequence of not performing a vulnerability as-sessment or not
addressing the identified vulnerabilities. Improving the change control process is not an objective, but rather
a possible outcome of performing a vulnerability assessment and incorporating its results and
recommendations into the change man-agement cycle. Updating the threat landscape is not an objective,
but rather a prereq-uisite for performing a vulnerability assessment that requires using up-to-date sources
of threat intelligence and vulnerability information. References: 1: Vulnerability As-sessment - NIST 2:
System Update - Techopedia : Vulnerability Assessment vs Penetra-tion Testing - Imperva : Change
Control Process - NIST : Threat Landscape - NIST

100
Q
  1. Which of the following is MOST important for an information security manager to verify before conducting
    full-functional continuity testing?

A. Risk acceptance by the business has been documented
B. Teams and individuals responsible for recovery have been identified
C. Copies of recovery and incident response plans are kept offsite
D. Incident response and recovery plans are documented in simple language

A

Answer: B

Explanation: Before conducting full-functional continuity testing, an information security manager should
verify that teams and individuals responsible for recovery have been identified and trained on their roles
and responsibilities. This will ensure that the testing can
be executed effectively and efficiently, as well as identify any gaps or issues in the recovery process. Risk
acceptance by the business, copies of plans kept offsite and plans documented in simple language are all
good practices for continuity management, but they are not as important as having clear roles and
responsibilities defined before testing.