CISM Flashcards

CISM

1
Q

The MOST important component of a privacy policy is:

A

Notifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is MOST likely to remain constant over time? An information security:

A

Strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the PRIMARY factor to be taken into account when designing a backup strategy that will be consistent with a disaster recovery strategy?

A

Recovery point objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When performing a business impact analysis, which of the following should calculate the recovery time and cost estimates?

A

Business process owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the MOST important reason for formally documenting security procedures?

A

Ensuring processes are repeatable and sustainable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following choices should be assessed after the likelihood of a loss event has been determined?

A

Magnitude of impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the BEST method to confirm that all firewall rules and router configuration settings are adequate?

A

Periodically perform penetration tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which two components PRIMARILY must be assessed in an effective risk analysis?

A

Likelihood and impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When designing an intrusion detection system, the information security manager should recommend that it be placed:

A

On a screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To BEST improve the alignment of the information security objectives in an enterprise, the chief information security officer should:

A

Evaluate a business balanced scorecard (BSC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following factors is MOST important for the successful implementation of an enterprise’s information security program?

A

Senior management support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Management decided that the enterprise will not achieve compliance with a recently issued set of regulations. Which of the following is the MOST likely reason for the decision?

A

The cost of compliance exceeds the cost of possible sanctions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Enterprises implement ethics training PRIMARILY to provide guidance to individuals engaged in:

A

Monitoring user activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To implement information security governance, an enterprise should FIRST:

A

Define security strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the BEST method to verify that all security patches applied to servers were properly documented?

A

Trace OS patch logs to change control requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following choices should be assessed after the likelihood of a loss event has been determined?

A

The magnitude of impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is the MAIN reason for performing risk assessment on a continuous basis?

A

The risk environment is constantly changing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the BEST way to ensure that security settings on each platform are in compliance with information security policies and procedures?

A

Establish security baselines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

New regulatory and legal compliance requirements that will have an effect on information security will MOST likely come from the:

A

Affected departments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Addressing the root cause of an incident is one aspect of which of the following incident management processes?

A

Eradication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Determining the level of effort needed to meet particular improvement targets in risk management can BEST be determined using which of the following tools?

A

A gap analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is MOST important when collecting evidence for forensic analysis?

A

Ensure the assignment of qualified personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An enterprise is transferring its IT operations to an offshore location. An information security manager should PRIMARILY focus on:

A

Conducting a risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A financial institution plans to allocate information security resources to each of its business divisions. What areas should security activities focus on?

A

Areas where threat, likelihood and impact are the greatest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Who should be assigned as data owner for sensitive customer data that are used only by the sales department and stored in a central database?

A

The head of the sales department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following do security policies need to be MOST closely aligned with?

A

Organizational needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When creating an effective data-protection strategy, the information security manager must understand the flow of data and its protection at various stages. This is BEST achieved with:

A

A tailored methodology based on exposure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following is MOST essential when assessing risk?

A

Considering both monetary value and likelihood of loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following is a key component of an incident response policy?

A

Escalation criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An enterprise has verified that its customer information was recently exposed. Which of the following is the FIRST step a security manager should take in this situation?

A

Determine the extent of the compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is the BEST approach for an enterprise desiring to protect its intellectual property?

A

Restrict access to a need-to-know basis

32
Q

Which of the following steps should be FIRST in developing an information security plan?

A

Analyze the current business strategy

33
Q

Which of the following individuals would be in the BEST position to sponsor the creation of an information security steering group?

A

Chief operating officer (COO)

34
Q

What mechanism should be used to identify deficiencies that would provide attackers with an opportunity to compromise a computer system?

A

Security gap analysis

35
Q

The MOST direct way to accurately determine the control baseline in an IT system is to do which of the following activities?

A

Review standards and system compliance

36
Q

Which of the following provides the BEST confirmation that the business continuity plan/disaster recovery plan (BCP/DRP) objectives have been achieved?

A

The recovery time objective was not exceeded during testing.

37
Q

Which of the following situations would be of the MOST concern to a security manager?

A

A Trojan was found installed on a systems administrator’s laptop.

38
Q

Which of the following would BEST prepare an information security manager for regulatory reviews?

A

Perform self-assessments using regulatory guidelines and reports.

39
Q

Which of the following BEST protects confidentiality of information?

A

Least privilege

40
Q

Which of the following techniques MOST clearly indicates whether specific risk-reduction controls should be implemented?

A

Cost-benefit analysis

41
Q

An information security manager is in the process of investigating a network intrusion. One of the enterprise’s employees is a suspect. The manager has just obtained the suspect’s computer and hard drive. Which of the following is the BEST next step?

A

Create an image of the original hard drive

42
Q

Which of the following choices is the BEST indicator of the state of information security governance?

A

A defined maturity level

43
Q

What is a desirable sensitivity setting for a biometric access control system that protects a high-security data center?

A

A high false reject rate

44
Q

The MOST useful way to describe the objectives in the information security strategy is through:

A

Attributes and characteristics of the desired state

45
Q

Quantifying the level of acceptable risk can BEST be indicated by which of the following choices?

A

Determining the ratio of business interruption insurance to its cost

46
Q

Which of the following control measures BEST addresses integrity?

A

Nonrepudiation

47
Q

Which of the following measures would be MOST effective against insider threats to confidential information?

A

Role-based access control

48
Q

With regard to the implementation of security awareness programs in an enterprise, it is MOST relevant to understand that which one of the following aspects can change?

A

Threats and vulnerabilities

49
Q

There is a delay between the time when a security vulnerability is first published, and the time when a patch is delivered. Which of the following should be carried out FIRST to mitigate the risk during this time period?

A

Identify the vulnerable systems and apply compensating controls

50
Q

Which of the following choices would be the MOST useful in determining the possible consequences of a major compromise?

A

Asset valuation

51
Q

An information security strategy presented to senior management for approval MUST incorporate:

A

Business priorities

52
Q

When outsourcing, to ensure that third-party service providers comply with an enterprise security policy, which of the following should occur?

A

A periodic security audit

53
Q

Which one of the following measures will BEST indicate the effectiveness of an incident response process?

A

Reduction of average response time to an incident

54
Q

The BEST process for assessing an existing risk level is:

A

A security review

55
Q

The triage phase of the incident response plan provides:

A

A snapshot of the current status of all incident activity reported.

56
Q

Which of the following choices BEST reveals the evolving nature of attacks in an online environment?

A

Industry tracking groups

57
Q

Which of the following is the MOST serious exposure of automatically updating virus signature files on every desktop each Friday at 11:00 p.m. (2300 hours)?

A

Systems are vulnerable to new viruses during the intervening week.

58
Q

The factor that is MOST likely to result in identification of security incidents is:

A

Security awareness training

59
Q

The MOST basic requirement for an information security governance program is to:

A

Be aligned with the corporate business strategy

60
Q

What is the BEST way to determine if an anomaly-based intrusion detection system (IDS) is properly installed?

A

Simulate an attack and review IDS performance

61
Q

Which of the following should be performed FIRST in the aftermath of a denial-of-service (DoS) attack?

A

Conduct an assessment to determine system status

62
Q

When should a request for proposal be issued?

A

Prior to developing a project budget

63
Q

Which of the following factors is the MOST significant in determining an enterprise’s risk appetite?

A

The organizational structure

64
Q

From an information security perspective, which of the following will have the GREATEST impact on a financial enterprise with offices in various countries and involved in transborder transactions?

A

Evolving data protection regulations

65
Q

With which of the following business functions is integration of information security MOST likely to result in risk being addressed as a standard part of production processing?

A

Quality assurance

66
Q

The MOST effective way to limit actual and potential impacts of e-discovery in the event of litigation is to:

A

Develop and enforce comprehensive retention policies

67
Q

Which of the following choices is the MOST significant single point of failure in a public key infrastructure?

A

A certificate authority’s (CA) private key

68
Q

Which of the following choices is the BEST input for the definition of escalation guidelines?

A

A risk and impact analysis

69
Q

What is the BEST way to ensure users comply with organizational security requirements for password complexity?

A

Enable system-enforced password configuration

70
Q

Information security managers should use risk assessment techniques to:

A

Justify selection of risk mitigation strategies

71
Q

Which of the following functions is responsible for determining the members of the enterprise’s response teams?

A

Information Security

72
Q

When a large enterprise discovers that it is the subject of a network probe, which of the following actions should be taken?

A

Monitor the probe and isolate the affected segment

73
Q

The concept of governance, risk and compliance serves PRIMARILY to:

A

Align enterprise assurance functions

74
Q

An enterprise’s board of directors is concerned about recent fraud attempts that originated over the Internet. What action should the board take to address this concern?

A

Direct executive management to assess the risk and report results to the board

75
Q

Under what circumstances do good information security practices dictate a full reassessment of risk?

A

After a material control failure