CISM Final Review Questions Flashcards
What are the security principles?
Need to know
Least Privilege
Seperation of duties
Risk proximity
Risk proximity is the time period before a risk might have an impact on one or more project objectives. It is an important factor to consider when prioritizing risks, as risks that are more likely to occur in the near future should be addressed first.
Risk proximity can be determined by a number of factors, including the following:
The nature of the risk. Some risks are more likely to occur sooner than others. For example, the risk of a supplier failing to deliver a critical component is more likely to occur in the near future if the delivery date is approaching.
The current state of the project. Some risks are more likely to occur if the project is in a certain phase or if certain milestones have not yet been met. For example, the risk of a project going over budget is more likely to occur if the project is already behind schedule.
External factors. Some risks are more likely to occur if certain external factors are present. For example, the risk of a project being delayed due to bad weather is more likely to occur if the project is being carried out during the winter months.
Project managers can use risk proximity to develop a risk management plan that focuses on mitigating the risks that are most likely to occur in the near future. This can help to reduce the overall risk to the project and improve its chances of success.
Here are some examples of risk proximity:
A supplier failing to deliver a critical component within the next week.
A new regulation being introduced that could impact the project’s scope or budget.
A key employee leaving the company in the next month.
A bad weather forecast for the week of a major project milestone.
Project managers should regularly review their risk management plan and update it as needed to reflect changes in risk proximity.
Which one of the following individuals would be the most effective organizational owner for an information security program?
A. CISM-certified analyst
B. Chief information officer (CIO)
C. Director of networking and infrastructure
D. President and CEO
The owner of information security programs may be different from the individuals responsible for implementing the controls. This person should be as senior an individual as possible who is able to focus on the management of the security program. The president and CEO would not be an appropriate choice because an executive at this level is unlikely to have the time necessary to focus on security. Of the remaining choices, the CIO is the most senior position who would be the strongest advocate at the executive level.
Paul is designing a compensating control for an issue that is preventing his organization from achieving PCI DSS compliance. Which one of the following statements about compensating controls is incorrect?
A. The control must provide a similar level of defense as the original requirement, such that the compensating control sufficiently offsets the risk that the original PCI DSS requirement was designed to defend against.
B. The control must meet the intent and rigor of the original requirement.
C. The organizations CISO (or other senior-most security executive) must personally approve the control.
D. The control must be “above and beyond” other PCI DSS requirements.
1
There are three requirements for PCI DSS compensating controls. First, the control must meet the intent and rigor of the original requirement. Second, the control must provide a similar level of defense as the original requirement, such that the compensating control sufficiently offsets the risk that the original PCI DSS requirement was designed to defend against. Third, the control must be “above and beyond” other PCI DSS requirements. There is no requirement that the CISO personally approve the use of any compensating control.
Evan is reviewing the reporting structure for cybersecurity leaders within a client organization. He notes that the CISO reports to the director of infrastructure and technology, who reports to the CIO. What statement is most accurate about this reporting relationship?
A. This is an appropriate reporting relationship because the CIO must keep a narrow span of control.
B. This is an appropriate reporting relationship because most cybersecurity issues involve networking and infrastructure.
C. This is not an appropriate reporting relationship because most cybersecurity issues do not involve networking and infrastructure.
D. This is not an appropriate reporting relationship because it creates a potential conflict of interest.
This approach creates a potential conflict of interest when the information security team disagrees with an approach endorsed by the director to whom they report. It would be far more appropriate for the CISO to report directly to the CIO, regardless of issues with span of control. It is irrelevant whether most cybersecurity issues in the organization include topics of networking and infrastructure.
Which one of the following statements is true about social media in the wake of a cybersecurity incident?
A. Social media use should be prohibited for incident response team members.
B. Management should always issue regular updates on social media.
C. Social media provides a good means of communication for team members during an incident.
D. Customers and other stakeholders are likely to discuss incidents on social media.
D
Incident responders must be aware of the impact of social media, regardless of whether they use it directly. Even if your organization does not directly discuss cybersecurity issues on social media, rest assured that your customers and other stakeholders will. Management may, but does not have to, provide updates on social media. Social media is not an effective communications mechanism for internal conversations, as it is not secure, but it is not reasonable for the organization to issue a complete ban on social media use.
A hierarchical management system?
A hierarchical management system is an organizational structure with different levels of authority, where instructions and decisions flow from senior management down to lower-ranking employees. This structure is common in larger businesses and organizations[4].
What is the standards of evidence for civil litigation and criminal litigation?
Most civil cases do not follow the beyond-a-reasonable-doubt standard of proof. Instead, they use the weaker preponderance of the evidence standard. Meeting this standard simply requires that the evidence demonstrate that the outcome of the case is more likely than not. For this reason, evidence collection standards for civil investigations are not as rigorous as those used in criminal investigations. You’ll learn more about security investigations and evidence standards in Chapter 8.
The standard of evidence for civil litigation in the United States is the preponderance of the evidence. This means that the plaintiff must prove that their claims are more likely than not to be true, or that they have a greater than 50% chance of being correct.
The preponderance of the evidence standard is a lower standard of proof than the beyond a reasonable doubt standard used in criminal cases. This is because the consequences of a civil lawsuit are typically less severe than the consequences of a criminal conviction.
The preponderance of the evidence standard is also a lower standard of proof than the clear and convincing evidence standard used in some civil cases, such as those involving fraud or child custody.
In order to meet the preponderance of the evidence standard, the plaintiff must present evidence that is credible, reliable, and persuasive. The plaintiff must also show that their evidence is more likely than not to be true than the defendant’s evidence.
The preponderance of the evidence standard is applied by the judge or jury in a civil trial. If the judge or jury finds that the plaintiff has met the preponderance of the evidence standard, then they will rule in favor of the plaintiff.
Here are some examples of evidence that may be considered in a civil trial:
Witness testimony
Expert testimony
Documents
Photographs
Video recordings
Physical evidence
The judge or jury will weigh all of the evidence presented in a civil trial before making a decision. The judge or jury will also consider the credibility of the witnesses and the persuasiveness of the evidence.
If you are involved in a civil lawsuit, it is important to understand the standard of evidence that applies to your case. This will help you to prepare your case and to understand what you need to do in order to win.
Jackie is concerned that her organization’s vulnerability scanning program might interfere with the operation of production systems. She would like to conduct the scans without installing any software on the systems that will be scanned. What type of scan should she avoid?
A. Server-based scans
B. Agent-based scans
C. Credentialed scans
D. Noncredentialed scans
B
Agent-based scans require installing scanning agents on the systems to be scanned, whereas server-based scans run using software on the scanning server. Alice wants to avoid installing any software, so she should stick with a server-based scan. These scans may be run in either credentialed or noncredentialed mode.
describe the pros and cons of the three different approaches to containment of a comprised host on a network.
Here is a description of the pros and cons of the three different approaches to containment of a compromised host on a network: segmentation, isolation, and removal:
Segmentation
Segmentation involves dividing the network into different segments and restricting communication between the segments. This can be done using firewalls, VLANs, and other networking technologies.
Pros:
Segmentation can help to prevent the spread of malware to other hosts on the network.
Segmentation can also help to improve the performance of the network by reducing traffic between the segments.
Cons:
Segmentation can be complex and expensive to implement.
Segmentation can also make it difficult to manage and troubleshoot the network.
Isolation
Isolation involves isolating the compromised host from the rest of the network. This can be done by moving the host to a dedicated network segment or by using a virtual machine to contain the host.
Pros:
Isolation is a simple and effective way to contain a compromised host.
Isolation is also relatively inexpensive to implement.
Cons:
Isolation can make it difficult to access the compromised host for remediation purposes.
Isolation can also disrupt the services that are provided by the compromised host.
Removal
Removal involves removing the compromised host from the network altogether. This is the most drastic measure, but it is also the most effective way to contain a compromised host.
Pros:
Removal is the most effective way to contain a compromised host.
Removal is also relatively simple to implement.
Cons:
Removal can disrupt the services that are provided by the compromised host.
Removal can also be expensive, especially if the compromised host is a critical server.
Which approach is right for you?
The best approach to containment will depend on the specific circumstances of the situation. If the compromised host is not providing any critical services, then removal may be the best option. If the compromised host is providing critical services, then segmentation or isolation may be a better option.
It is important to note that all three approaches to containment may have some impact on the availability of services. It is important to weigh the risks and benefits of each approach before making a decision.
Here are some additional considerations:
Segmentation: Segmentation can be a good option if you have a large network and you can afford to implement it. However, it is important to note that segmentation can be complex and difficult to manage.
Isolation: Isolation is a good option if you have a small network or if you cannot afford to implement segmentation. However, it is important to note that isolation can make it difficult to access the compromised host for remediation purposes.
Removal: Removal is a good option if the compromised host is not providing any critical services. However, it is important to note that removal can disrupt the services that are provided by the compromised host.
It is also important to have a plan in place for remediating the compromised host. Once the host has been contained, you will need to clean it up and restore it to service.
what is the difference between a security awareness tool and security education
A security awareness tool is a software application that helps organizations to educate and train their employees about security best practices. Security awareness tools typically provide users with a variety of resources, such as interactive training modules, quizzes, and games.
Security education is a broader concept that encompasses all of the activities that an organization undertakes to help its employees learn about security. Security education can include formal training programs, informal workshops, and on-the-job training.
The main difference between security awareness tools and security education is that security awareness tools are typically more focused on providing users with information about security threats and best practices, while security education is more focused on helping users to develop the skills and knowledge they need to implement security best practices.
Security awareness tools can be a valuable part of an organization’s security education program. They can help to provide users with the information they need to be aware of security threats and to take steps to protect themselves and their organizations. However, security awareness tools should not be seen as a replacement for security education. Security education is necessary to help users to develop the skills and knowledge they need to implement security best practices effectively.
Here are some examples of security awareness tools:
KnowBe4
PhishMe
Security Awareness Training by Proofpoint
SANS Institute Security Awareness Training
Awareness by KnowBe4
Here are some examples of security education programs:
Certified Information Systems Security Professional (CISSP) certification program
Offensive Security Certified Professional (OSCP) certification program
GIAC Security Essentials Certification (GSEC) certification program
SANS Institute security courses
Security+ certification program
Organizations should choose the security awareness tools and security education programs that are right for their needs. The best approach will depend on the size of the organization, the industry in which the organization operates, and the specific security risks that the organization faces.
Which one of the following technologies would be most helpful in managing the configuration of devices brought into an organization under a BYOD computing approach?
A. MDM
B. Firewall
C. IPS
D. DLP
obile device management (MDM) solutions manage the secure configuration of mobile devices, including those brought into the organization under a Bring Your Own Device (BYOD) policy. Data loss prevention (DLP) systems do protect the organization against the accidental or intentional exfiltration of data, but they do not manage system configurations.
Intrusion prevention systems (IPSs) do protect the organization against potentially malicious network traffic, but they do not manage system configurations. Firewalls do protect the organization against potentially malicious network traffic, but they do not manage system configurations.
What type of disaster recovery test activates the alternate processing facility and uses it to conduct transactions but leaves the primary site up and running?
A. Checklist review
B. Full interruption test
C. Parallel test
D. Tabletop exercise
C
During a parallel test, the team actually activates the disaster recovery site for testing but the primary site remains operational. During a full interruption test, the team takes down the primary site and confirms that the disaster recovery site is capable of handling regular operations. The full interruption test is the most thorough test but also the most disruptive. The checklist review is the least disruptive type of disaster recovery test. During a checklist review, team members each review the contents of their disaster recovery checklists on their own and suggest any necessary changes. During a tabletop exercise, team members come together and walk through a scenario without making any changes to information systems.
Sure, here is a rewritten summary of the pros and cons of each disaster recovery test, including a description of each test:
Read-through test
Description: A read-through test is a walkthrough of the disaster recovery plan to identify any gaps or potential problems. It involves reading the plan carefully and thinking about how it would be implemented in a real disaster.
Pros:
Least expensive and disruptive type of disaster recovery test
Can help to identify gaps and potential problems in the plan
Cons:
Does not test the disaster recovery plan in a real-world environment
May not be able to identify all of the potential problems that could occur during a real disaster
Structured walk-through
Description: A structured walk-through is a more in-depth review of the disaster recovery plan. It involves gathering all of the people who would be involved in responding to a disaster and walking through the plan step-by-step.
Pros:
More realistic test of the disaster recovery plan than a read-through test
Can help to identify problems in the plan that may not be identified in a read-through test
Can help to train employees on how to implement the disaster recovery plan
Cons:
More expensive and disruptive than a read-through test
May not be as realistic as other types of disaster recovery tests
Simulation test
Description: A simulation test is a more realistic test of the disaster recovery plan than a read-through test or structured walk-through. It involves creating a simulated disaster environment and then testing the disaster recovery plan to see how it performs.
Pros:
More realistic test of the disaster recovery plan than a read-through test or structured walk-through
Can help to identify problems in the plan that may not be identified in other types of tests
Can help to train employees on how to implement the disaster recovery plan in a real-world environment
Cons:
More expensive and disruptive than other types of disaster recovery tests
May not be as realistic as a full interruption test
Parallel test
Description: A parallel test is a more realistic test of the disaster recovery plan than a read-through test, structured walk-through, or simulation test. It involves running the disaster recovery plan in parallel with the production environment. This allows you to test the disaster recovery plan without disrupting operations.
Pros:
More realistic test of the disaster recovery plan than a read-through test, structured walk-through, or simulation test
Can help to identify problems in the plan that may not be identified in other types of tests
Can help to train employees on how to implement the disaster recovery plan in a real-world environment
Cons:
More expensive and disruptive than other types of disaster recovery tests
May not be as realistic as a full interruption test
Full interruption test
Description: A full interruption test is the most realistic test of the disaster recovery plan. It involves failing over to the disaster recovery site and testing the disaster recovery plan in a real-world environment.
Pros:
Most realistic test of the disaster recovery plan
Can help to identify any problems in the plan that were not identified in other types of tests
Cons:
Most expensive and disruptive type of disaster recovery test
Can have a significant impact on operations
Which type of test is right for you?
The best type of disaster recovery test for you will depend on your organization’s budget, risk tolerance, and the complexity of your disaster recovery plan. If you are on a tight budget, then a read-through test or structured walk-through may be the best option. If you have a more complex disaster recovery plan, then a simulation test, parallel test, or full interruption test may be necessary.
It is important to note that disaster recovery testing should be conducted on a regular basis to ensure that the disaster recovery plan is still effective. The frequency of testing will depend on the organization’s industry and the specific security risks that the organization faces.
Here are some additional considerations:
Read-through tests and structured walk-throughs: These tests are a good way to start testing your disaster recovery plan. They can help you to identify any gaps or potential problems in the plan.
Simulation tests and parallel tests: These tests are a good way to test your disaster recovery plan in a more realistic environment. They can help you to identify problems in the plan that may not be identified in read-through tests or structured walk-throughs.
Full interruption tests: These tests are the most realistic tests of your disaster recovery plan. However, they are also the most expensive and disruptive type of test. You should only conduct full interruption tests if you are confident that your disaster recovery plan is ready for production.
Alexis is working to develop standard language for use with vendors that will ensure that her organization retains ownership of data handled by the vendor. Where would be the best location to include this language?
A. Contract
B. NDA
C. MOU
D. SOW
A
Data ownership language should be legally binding and part of the master agreement with the vendor. As it is such an important topic, it should be included in the formal contract with the vendor. It is not appropriate subject matter for a nondisclosure agreement (NDA) that focuses on confidentiality or a less formal vehicle, such as a memorandum of understanding (MOU) or statement of work (SOW).
What are KRIs?
Key risk indicators (KRIs) are measures that are intended to quantify the security risk facing an organization. KRIs, unlike KPIs and KGIs, are a look forward. They attempt to show how much risk exists that may jeopardize the future security of the organization. Key performance indicators (KPIs) are metrics that demonstrate the success of the security program in achieving its objectives. KPIs are mutually agreed-upon measures that evaluate whether a security program is meeting its defined goals. Generally speaking, KPIs are a look backwards at historical performance, providing a measuring stick to evaluate the past success of the program. Key goal indicators (KGIs) are similar to KPIs but measure progress toward defined goals. For example, if an organization has a goal to eliminate all stored social security numbers, a KGI might track the percentage of SSNs removed. KMIs are not a standard metric for cybersecurity programs.
Kyle is conducting a penetration test. After gaining access to an organization’s database server, he installs a backdoor on the server to grant himself access in the future. What term best describes this action?
A. Privilege escalation
B. Lateral movement
C. Maneuver
D. Persistence
You Answered Correctly!
Backdoors are a persistence tool, designed to make sure that the attacker’s access persists after the original vulnerability is remediated. Kyle can use this backdoor to gain access to the system in the future, even if the original exploit that he used to gain access is no longer effective.
Renee is a cybersecurity hobbyist. She receives an email about a new web-based grading system being used by her son’s school and she visits the site. She notices that the URL for the site looks like this:
https://www.myschool.edu/grades.php&studentID=1023425
She realizes that 1023425 is her son’s student ID number and then attempts to access the following similar URLs:
https://www.myschool.edu/grades.php&studentID=1023423
https://www.myschool.edu/grades.php&studentID=1023424
https://www.myschool.edu/grades.php&studentID=1023426
https://www.myschool.edu/grades.php&studentID=1023427
When she does so, she accesses the records of other students. She closes the records and immediately informs the school principal of the vulnerability. What term best describes Renee’s work?
A. White-hat hacking
B. Green-hat hacking
C. Gray-hat hacking
D. Black-hat hacking
C
Renee was not authorized to perform this security testing, so her work does not fit into the category of white-hat hacking. However, she also does not have malicious intent, so her work cannot be categorized as a black-hat attack. Instead, it fits somewhere in between the two extremes and would best be described as gray-hat hacking.
Different types of hackers?
Hackers are people who use their computer skills to gain unauthorized access to computer systems or networks. There are three main types of hackers: white hat, black hat, and gray hat.
White hat hackers are also known as ethical hackers. They use their skills to find and report security vulnerabilities in computer systems and networks. White hat hackers help organizations to improve their security posture and protect themselves from cyberattacks.
Black hat hackers are malicious hackers who use their skills to gain unauthorized access to computer systems and networks for personal gain. Black hat hackers may steal data, install malware, or disrupt operations. Black hat hacking is illegal and can have serious consequences for both individuals and organizations.
Gray hat hackers are somewhere in between white hat and black hat hackers. They may use their skills to find and report security vulnerabilities in computer systems and networks, but they may also do so for their own personal gain. Gray hat hackers may also use their skills to hack into computer systems and networks without permission, but they may not do so with malicious intent.
The following table summarizes the key differences between white hat, black hat, and gray hat hackers:
Type of hacker Motivation Actions
White hat Ethical Finds and reports security vulnerabilities in computer systems and networks to help organizations improve their security posture.
Black hat Malicious Gains unauthorized access to computer systems and networks for personal gain, such as stealing data, installing malware, or disrupting operations.
Gray hat Somewhere in between white hat and black hat May find and report security vulnerabilities in computer systems and networks, but may also do so for their own personal gain. May also hack into computer systems and networks without permission, but may not do so with malicious intent.
It is important to note that the distinction between white hat, black hat, and gray hat hackers is not always clear-cut. Some hackers may start out as white hat hackers, but may turn to black hat hacking if they are not able to make a living from white hat hacking. Other hackers may start out as black hat hackers, but may eventually turn to white hat hacking if they realize that they can do more good than harm with their skills.
provide details about electronic discovery reference model
Sure. Here is a rewritten version of my previous response, with an example for each stage of the Electronic Discovery Reference Model (EDRM):
Information governance: This stage involves developing and implementing policies and procedures for managing electronic information. For example, an organization may have a policy that requires all employees to retain all work-related emails for a period of five years.
Identification: This stage involves identifying the electronically stored information (ESI) that is relevant to a legal proceeding. For example, if an organization is sued for wrongful termination, the ESI that may be relevant to the case may include email messages, text messages, and social media posts.
Preservation: This stage involves taking steps to preserve the ESI that has been identified. For example, an organization may need to implement a litigation hold to prevent employees from deleting or modifying relevant ESI.
Collection: This stage involves collecting the ESI that has been identified and preserved. For example, an organization may need to collect email messages, text messages, and social media posts from relevant employees.
Processing: This stage involves processing the ESI to make it searchable and reviewable. For example, an organization may need to convert email messages to a searchable format and index them.
Review: This stage involves reviewing the ESI to identify the relevant and responsive documents. For example, an organization may need to hire attorneys to review the ESI and identify the documents that are relevant to the case.
Analysis: This stage involves analyzing the ESI to identify trends and patterns. For example, attorneys may use data analysis software to identify trends in the ESI, such as who was communicating with whom and what topics they were discussing.
Production: This stage involves producing the ESI to the opposing party or the court. For example, an organization may need to produce email messages, text messages, and social media posts to the opposing party.
Presentation: This stage involves presenting the ESI at trial or during other legal proceedings. For example, attorneys may use email messages, text messages, and social media posts to support their case at trial.
The EDRM is a valuable tool that can help organizations to manage the e-discovery process more effectively and efficiently.
What phase of the Electronic Discovery Reference Model examines information to remove information subject to attorney-client privilege?
A. Collection
B. Processing
C. Review
D. Identification
Review examines the information resulting from the Processing phase to determine what information is responsive to the request and remove any information protected by attorney-client privilege. Identification locates the information that may be responsive to a discovery request when the organization believes that litigation is likely. Collection gathers the relevant information centrally for use in the eDiscovery process. Processing screens the collected information to perform a “rough cut” of irrelevant information, reducing the amount of information requiring detailed screening.
Admissible Evidence
Evidence that is relevant to determining a fact. The fact that the evidence seeks to determine must be material (in other words, related) to the case. In addition, the evidence must be competent, meaning that it must have been obtained legally. Evidence that results from an illegal search would be inadmissible because it is not competent.
Asset Criticality
Estimate of the priority/value of the asset to the organization. Helps guide decisions about the types of scans that are performed, the frequency of those scans, and the priority administrators should place on remediating vulnerabilities detected by the scan.
Best Evidence Rule
States that when a document is used as evidence in a court proceeding, the original document must be introduced.
Beyond a Reasonable Doub
t Standard of evidence where the prosecution must demonstrate that the defendant committed the crime by presenting facts from which there are no other logical conclusions.
Business Partnership Agreement (BPA)
A contract between two entities dictating their business relationship. It clearly defines the expectations and obligations of each partner in the endeavor.
Certificate Signing Request (CSR)
A message sent from an applicant to a registration authority of the Public Key Infrastructure in order to apply for a digital identity certificate.
Certificate Stapling
A means for checking the revocation status of X.509 digital certificates. It is a mechanism that enables the presenter of a certificate to append or staple a time- stamped OCSP response signed by the issuing certificate authority (CA).
CMMI (Capability Maturity Model Integration)
A formal software development management concept that describes the process that organizations undertake as they move toward incorporating solid engineering principles into their software development processes.
Data Loss Prevention (DLP)
Any systems that identify, monitor, and protect data to prevent it from unauthorized use, modification, destruction, egress, or exfiltration from a location.
Data Masking
Partially redacts sensitive information by replacing some or all sensitive fields with blank characters.
Data Minimization
Techniques used to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis.
Data Obfuscation
The process that transforms data into a format where the original information can’t be retrieved.
Digital Signatures
A method for assuring a recipient that a message truly came from the claimed sender and that the message was not altered while in transit between the sender and recipient. A digital signature is created by encrypting or signing the hash of the message with the private key of the sender.
Direct Evidence
Evidence that proves or disproves a specific act through oral testimony based on information gathered through the witness’s five senses.
Domain Validation (DV) Certificates
Certificate issued based upon the CA’s verification that the certificate subject has control over a domain name.
Electronic Discovery Reference Model (EDRM)
A framework that outlines standards for the recovery and discovery of digital data related to legal proceedings.
Enterprise Risk Management (ERM)
A formal approach to risk analysis that begins with identifying risks, continues with determining the severity of each risk, and then results in adopting one or more risk management strategies to address each risk.
Exposure Factor (EF)
Determines the amount of damage that will occur to the asset if the risk materializes; generally expressed as a percentage of the value of the asset.
Extended Validation (EV) Certificates
Provide a high level of assurance because the CA takes steps to verify that the certificate owner is a legitimate business before issuing the certificate.
Full Interruption Tests
Shutting down operations at the primary site and shifting them to the recovery site.