CISM Flashcards
CISM
The MOST important component of a privacy policy is:
Notifications
Which of the following is MOST likely to remain constant over time? An information security:
Strategy
What is the PRIMARY factor to be taken into account when designing a backup strategy that will be consistent with a disaster recovery strategy?
Recovery point objective
When performing a business impact analysis, which of the following should calculate the recovery time and cost estimates?
Business process owners
What is the MOST important reason for formally documenting security procedures?
Ensuring processes are repeatable and sustainable.
Which of the following choices should be assessed after the likelihood of a loss event has been determined?
Magnitude of impact
What is the BEST method to confirm that all firewall rules and router configuration settings are adequate?
Periodically perform penetration tests
Which two components PRIMARILY must be assessed in an effective risk analysis?
Likelihood and impact
When designing an intrusion detection system, the information security manager should recommend that it be placed:
On a screened subnet
To BEST improve the alignment of the information security objectives in an enterprise, the chief information security officer should:
Evaluate a business balanced scorecard (BSC)
Which of the following factors is MOST important for the successful implementation of an enterprise’s information security program?
Senior management support
Management decided that the enterprise will not achieve compliance with a recently issued set of regulations. Which of the following is the MOST likely reason for the decision?
The cost of compliance exceeds the cost of possible sanctions.
Enterprises implement ethics training PRIMARILY to provide guidance to individuals engaged in:
Monitoring user activities
To implement information security governance, an enterprise should FIRST:
Define security strategy
What is the BEST method to verify that all security patches applied to servers were properly documented?
Trace OS patch logs to change control requests
Which of the following choices should be assessed after the likelihood of a loss event has been determined?
The magnitude of impact
Which of the following is the MAIN reason for performing risk assessment on a continuous basis?
The risk environment is constantly changing.
What is the BEST way to ensure that security settings on each platform are in compliance with information security policies and procedures?
Establish security baselines
New regulatory and legal compliance requirements that will have an effect on information security will MOST likely come from the:
Affected departments
Addressing the root cause of an incident is one aspect of which of the following incident management processes?
Eradication
Determining the level of effort needed to meet particular improvement targets in risk management can BEST be determined using which of the following tools?
A gap analysis
Which of the following is MOST important when collecting evidence for forensic analysis?
Ensure the assignment of qualified personnel
An enterprise is transferring its IT operations to an offshore location. An information security manager should PRIMARILY focus on:
Conducting a risk assessment
A financial institution plans to allocate information security resources to each of its business divisions. What areas should security activities focus on?
Areas where threat, likelihood and impact are the greatest.
Who should be assigned as data owner for sensitive customer data that are used only by the sales department and stored in a central database?
The head of the sales department
Which of the following do security policies need to be MOST closely aligned with?
Organizational needs
When creating an effective data-protection strategy, the information security manager must understand the flow of data and its protection at various stages. This is BEST achieved with:
A tailored methodology based on exposure.
Which of the following is MOST essential when assessing risk?
Considering both monetary value and likelihood of loss.
Which of the following is a key component of an incident response policy?
Escalation criteria
An enterprise has verified that its customer information was recently exposed. Which of the following is the FIRST step a security manager should take in this situation?
Determine the extent of the compromise