CISM Deck I Flashcards
Business goals define the strategic direction of the organization. Functional goals define the tactical direction of a business function. Security goals define the security direction of the organization. What is the MOST important relationship between these concepts?
- Functional goals should be derived from security goals
- Security and business goals should be defined independently from each other
- Business goals should be derived from security goals
- Security goals should be derived from business goals
Security goals should be derived from business goals
Explanation
Security goals should be developed based on the overall business strategy. The business strategy is the most important steering mechanism for directing the business and is defined by the highest management level.
Which of the following is the MOST appropriate frequency for updating antivirus signature files for antivirus software on production servers?
- Concurrently with operating system patch updates
- Daily
- During scheduled change control updates
- Weekly
Daily
Explanation
New viruses are being introduced almost daily. The effectiveness of virus detection software depends on frequent updates to its virus signatures, which are stored on antivirus signature files so updates may be carried out several times during the day. At a minimum, daily updating should occur.
Risk acceptance is a component of which of the following?
- Risk mitigation
- Risk monitoring
- Risk assessment
- Risk identification
Risk mitigation
Explanation
If after risk evaluation a risk is unacceptable, acceptability is determined after risk mitigation efforts.
The MOST effective way to ensure that outsourced service providers comply with the organization’s information security policy would be:
- security awareness training
- penetration testing
- periodically auditing
- service level monitoring
Periodically Auditing
Regular audit exercise can spot any gap in the information security compliance.
Which of the following is MOST essential for a risk management program to be effective?
- Accurate risk reporting
- Flexible security budget
- Sound risk baseline
- Detection of new risk
Detection of New Risk
Explanation
All of these procedures are essential for implementing risk management. However, without identifying new risk, other procedures will only be useful for a limited period.
What is the PRIMARY factor to be taken into account when designing a backup strategy that will be consistent with a disaster recovery strategy?
- Interruption window
- Recovery point objective
- Volume of sensitive data
- Recovery time objective
Recovery Point Objective
Explanation
The recovery point objective defines the maximum loss of data acceptable by the business (i.e., age of data to be restored). It will directly determine the basic elements of the backup strategy-frequency of the backups and what kind of backup is the most appropriate (disk-to-disk, on tape, mirroring).
Which of the following is MOST effective for securing wireless networks as a point of entry into a corporate network?
- Internet-facing firewall
- Boundary router
- Intrusion detection system
- Strong encryption
Strong Encryption
Explanation
Strong encryption is the most effective means of protecting wireless networks.
Which of the following is characteristic of decentralized information security management across a geographically dispersed organization?
- More savings in total operating costs
- More uniformity in quality of service
- Better adherence to policies
- Better alignment to business unit needs
Better alignment to business unit needs
Decentralization of information security management generally results in better alignment to business unit needs because security management is closer to the end user.
The decision as to whether an IT risk has been reduced to an acceptable level should be determined by:
- organizational requirements
- information security requirements
- international standards
- information systems requirements
organizational requirements
Organizational requirements should determine when a risk has been reduced to an acceptable level.
Which of the following is characteristic of centralized information security management?
- More responsive to business unit needs
- More expensive to administer
- Faster turnaround of requests
- Better adherence to policies
Better adherence to policies
Centralization of information security management results in greater uniformity and better adherence to security policies.
Which of the following is the MOST important consideration when implementing an intrusion detection system?
- Packet filtering
- Patching
- Encryption
- Tuning
Tuning
If an intrusion detection system is not properly tuned it will generate an unacceptable number of false positives and/or fail to sound an alarm when an actual attack in underway.
Which of the following requirements would have the LOWEST level of priority in information security?
- Business
- Technical
- Regulatory
- Privacy
Technical
Explanation
Information security priorities may, at times, override technical specifications, which then must be rewritten to conform to minimum security standards.
An information security manager is investigating an internal cybersecurity incident and has been directed to preserve potential evidence. After an image copy of the hard drive of suspected systems with a commonly used tool and making copies on which to perform analysis, which of the following should the information security manager do NEXT?
- Use an alternate tool to make an image copy of the hard drive
- Encrypt the primary and backup hard drive images
- Document the process used to make an image copy of the hard drive
- Generate hashes for the primary and backup hard drive images
Generate hashes for the primary and backup hard drive images
Generating hashes for the primary and backup memory dumps provides a means of demonstrating that the dump used for analysis is identical to the one stored for reference. It is essential that this step be performed before anything might happen to corrupt the original memory source, so it should be done as soon as possible.
Which of the following is the MOST important factor when designing information security architecture?
- Scalability of the network
- Development methodologies
- Technical platform interfaces
- Stakeholder requirements
Stakeholder requirements
Explanation
The most important factor for information security is that it advances the interests of the business, as defined by stakeholder requirements.
A computer incident response team manual should PRIMARILY contain which of the following documents?
- Severity criteria
- Risk assessment results
- Emergency call tree directory
- Table of critical backup files
Severity Criteria
Explanation
Quickly ranking the severity criteria of an incident is a key element of incident response.
Which of the following is the MOST effective solution for preventing internal users from modifying sensitive and classified information?
- System access violation logs
- Baseline security standards
- Exit routines
- Role-based access controls
Role-based access controls
Role-based access controls help ensure that users only have access to files and systems appropriate for their job role.
What is a reasonable expectation to have of a risk management program?
- It reduces control risk to zero
- It implements preventive controls for every threat
- It removes all inherent risk
- It maintains residual risk at an acceptable level
It maintains residual risk at an acceptable level
Explanation
The goal of risk management is to ensure that all residual risk is maintained at a level acceptable to the business.
Which two components PRIMARY must be assessed in an effective risk analysis?
- Probability and frequency
- Likelihood and impact
- Financial impact and duration
- Visibility and duration
Likelihood and Impact
Explanation
Likelihood and impact are the primary elements that are determined in a risk analysis.
What is the MOST important contractual element when contracting with an outsourcer to provide security administration?
- The financial penalties clause
- The right-to-terminate clause
- The service level agreement
- Limitations of liability
The service level agreement
Explanation
The SLA includes the other options in addition to a number of other conditions, representations and warranties as well as right to inspect, provisions for audits, requirements on termination, etc.
Attackers who exploit cross-site scripting vulnerabilities take advantage of:
- flawed cryptographic Secure Sockets Layer implementations and short key lengths
- a lack of proper input validation controls
- Implicit web application trust relationships
- weak authentication controls in the web application layer
a lack of proper input validation controls
Explanation
Cross-site scripting attacks inject malformed input.
The MOST appropriate role for senior management in supporting information security is the:
•
assessment of risk to the organization
•
approval of policy statements and funding
•
developing standards sufficient to achieve acceptable risk
•
evaluation of vendors offering security products
approval of policy statements and funding
Explanation
Policies are a statement of senior management intent and direction. Therefore, senior management must approve them in addition to providing sufficient funding to achieve the organization’s risk management objectives.
Which of the following measures would be MOST effective against insider threats to confidential information? • Defense in depth • Role-based access control • Privacy policy • Audit trail monitoring
Role-based access control
Explanation
Role-based access control is a preventive control that provides access according to business needs; therefore, it reduces unnecessary access rights and enforces accountability.
Senior management commitment and support for information security can BEST be obtained through presentations that:
•
use illustrative examples of successful attacks
•
evaluate the organization against good security practices
•
explain the technical risk to the organization
•
tie security risk to key business objectives
tie security risk to key business objectives
Explanation
Senior management wants to understand the business justification for investing in security in relation to achieving key business objectives.
Which of the following BEST ensures that information transmitted over the Internet will remain confidential? • Biometric authentication • Two-factor authentication • A virtual private network • Firewalls and router
A virtual private network
Explanation
Encryption of data in a virtual private network ensure that transmitted information is not readable, even if intercepted.
Which of the following security mechanisms is MOST effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization’s network?
•
Strength of encryption algorithms
•
Configuration of firewalls
•
Safeguards over keys
•
Authentication within application
Safeguards over keys
Explanation
Key management is the weakest link in encryption. If keys are in the wrong hands, documents will be able to be read regardless of where they are on the network.
A control policy is MOST likely to address which of the following implementation requirements? • Failure modes • Training requirements • Specific metrics • Operational capabilities
Failure modes
Explanation
A control policy will state the required failure modes in terms of whether a control fails open or fails closed, which has implications for safety, confidentiality and availability.
What is the PRIMARY objective of a risk management program? • Implement effective controls • Achieve acceptable risk • Eliminate business risk • Minimize inherent risk
Achieve acceptable risk
Explanation
The goal of a risk management program is to ensure that acceptable risk levels are achieved and maintained.
Which of the following would BEST prepare an information security manager for regulatory reviews?
•
Ensure all regulatory inquiries are sanctioned by the legal department
•
Assess previous regulatory reports with process owners input
•
Perform self-assessments using regulatory guidelines and reports
•
Assign an information security administrator as regulatory liaison
Perform self-assessments using regulatory guidelines and reports
Explanation
Self-assessments provide the best feedback on readiness and permit identification of items requiring remediation.
Evidence from a compromised server must be acquired for a forensic investigation. What would be the BEST source?
•
The last verified backup stored offsite
•
A bit-level copy of the hard drive
•
Backup servers
•
Data from volatile memory
A bit-level copy of the hard drive
Explanation
The bit-level copy image file ensures forensic quality evidence that is admissible in a court of law.
Which of the following actions should be taken when an information security manager discovers that a hacker is footprinting the network perimeter?
•
Enable server trace routing on the demilitarized zone segment
•
Check intrusion detection system logs and monitor for any active attacks
•
Update IDS software to the latest available version
•
Reboot the border router connected to the firewall
Check intrusion detection system logs and monitor for any active attacks
Explanation
Information security should check the intrusion detection system (IDS) logs and continue to monitor the situation. It would be inappropriate to take any action beyond that.
Which of the following would be the BEST indicator of effective information security governance within an organization?
•
Security training is available to all employees on the intranet
•
IT personnel are trained in testing and applying required patches
•
The steering committee approves security projects
•
Security policy training is provided to all managers
The steering committee approves security projects
Explanation
The existence of a steering committee that approves all security projects would be an indication of the existence of a good governance program. To ensure that all stakeholders impacted by security considerations are involved, many organizations use a steering committee comprised of senior representatives of affected groups. This composition helps to achieve consensus on priorities and trade-offs and serves as an effective communication channel for ensuring the alignment of the security program with business objectives.
Which of the following is a key component of an incident response policy?
•
Press release templates
•
Critical backup files inventory
•
Updated call trees
•
Escalation criteria
Escalation criteria
Explanation
Escalation criteria, indicating the circumstances under which specific actions are to be undertaken, should be contained within an incident response policy.
When designing an intrusion detection system, the information security manager should recommend that it be placed: • on the firewall server • outside the firewall • on the external router • on a screened subnet
on a screened subnet
Explanation
An IDS should be placed on a screened subnet, which is a demilitarized zone.
Which of the following BEST ensures that modifications made to in-house developed business applications do not introduce new security exposures? • Chang management • Stress testing • Patch management • Security baselines
Change management
Explanation
Change management controls the process of introduction changes to systems to ensure that unintended changes are not introduced; within change management, regression testing is specifically designed to prevent the introduction of new security exposures when making modifications.
Which of the following is the MOST appropriate use of gap analysis?
•
Measuring current state versus desired future state
•
Evaluating a business impact analysis
•
Developing a business balanced scorecard
•
Demonstrating the relationship between controls
Measuring current state versus desired future state
Explanation
A gap analysis is most useful in addressing the differences between the current state and future state.
Which of the following is the BEST basis for determining the criticality and sensitivity of information assets?
•
A resource dependency assessment
•
A vulnerability assessment
•
A threat assessment
•
An impact assessment
An impact assessment
Explanation
The criticality and sensitivity of information assets depends on the impact of the likelihood of the threats exploiting vulnerabilities in the asset and takes into consideration the value of the assets and the impairment of the value.
A web server is a financial institution that has been compromised using a super-user account has been isolated, and proper forensic processes have been followed. What is the most appropriate next step?
•
Rebuild the server from the last verified backup
•
Rebuild the server with original media and relevant patches
•
Place the web server in quarantine
•
Shut down the server in an organized manner
Rebuild the server with original media and relevant patches
Explanation
The original media should be used because one could never find and eliminate all the changes a super-user may have made or the time lines in which these changes were made.
When properly tested, which of the following would MOST effectively support an information security manager in handling a security breach? • Incident response plan • Vulnerability management plan • Disaster recovery plan • Business continuity plan
Incident Response Plan
Explanation
An incident response plan documents the step-by-step process to follow, as well as the related roles and responsibilities pertaining to all parties involved in responding to an information security breach.
A web-based business application is being migrated from test to production. Which of the following is the MOST important management sign-off for this migration? • User • Network • Database • Operations
User
Explanation
As owners of the system, user management sign-off is the most important. If a system does not meet the needs of the business, then it has not met its primary objective.
Which of the following groups would be in the BEST position to perform a risk analysis for a business?
•
A specialized management consultant
•
Process owners
•
A peer group within a similar business
•
External auditors
Process Owners
Explanation
Process owners have the most in-depth knowledge of risk and compensating controls within their environment.