CISM Practice C Topic 3 Flashcards
Who can BEST advocate the development of and ensure the success of an information security program?
Steering committee
Which of the following BEST ensures that information transmitted over the Internet will remain confidential?
Virtual private network (VPN)
The effectiveness of virus detection software is MOST dependent on which of the following?
Definition tables
Which of the following is the MOST effective type of access control?
Role-based
Which of the following devices should be placed within a DMZ?
Mail relay
An intrusion detection system should be placed:
on a screened subnet.
The BEST reason for an organization to have two discrete firewalls connected directly to the Internet and to the same DMZ would be to:
permit traffic load balancing.
An extranet server should be placed:
on a screened subnet.
Which of the following is the BEST metric for evaluating the effectiveness of security awareness twining?
reported incidents.
Security monitoring mechanisms should PRIMARILY:
focus on business-critical information.
Which of the following is the BEST method for ensuring that security procedures and guidelines are known and understood?
Computer-based certification training (CBT)
When contracting with an outsourcer to provide security administration, the MOST important contractual element is the:
service level agreement (SLA).
Which of the following is the BEST metric for evaluating the effectiveness of an intrusion detection mechanism?
Ratio of false positives to false negatives
Which of the following is MOST effective in preventing weaknesses from being introduced into existing production systems?
Change management
Which of the following tools is MOST appropriate for determining how long a security project will take to implement?
Critical path
Which of the following is MOST effective in preventing security weaknesses in operating systems?
Patch management
When a proposed system change violates an existing security standard, the conflict would be BEST resolved by:
calculating the residual risk.
Who can BEST approve plans to implement an information security governance framework?
Steering committee
Which of the following is the MOST effective solution for preventing internal users from modifying sensitive and classified information?
Role-based access controls
Which of the following is generally used to ensure that information transmitted over the Internet is authentic and actually transmitted by the named sender?
Embedded digital signature
Which of the following is the MOST appropriate frequency for updating antivirus signature files for antivirus software on production servers?
Daily
Which of the following devices should be placed within a demilitarized zone (DMZ)?
Web server
On which of the following should a firewall be placed?
Domain boundary
An intranet server should generally be placed on the:
internal network.
Access control to a sensitive intranet application by mobile users can BEST be implemented through:
two-factor authentication.
When application-level security controlled by business process owners is found to be poorly managed, which of the following could BEST improve current practices?
Centralizing security management
Security awareness training is MOST likely to lead to which of the following?
Increase in reported incidents
The information classification scheme should:
consider possible impact of a security breach.
Which of the following is the BEST method to provide a new user with their initial password for email system access?
Give a dummy password over the telephone set for immediate expiration
An information security program should be sponsored by:
key business process owners.
Which of the following is the MOST important item to include when developing web hosting agreements with third-party providers?
Service levels
The BEST metric for evaluating the effectiveness of a firewall is the:
number of attacks blocked.
Which of the following ensures that newly identified security weaknesses in an operating system are mitigated in a timely fashion?
Patch management
The MAIN advantage of implementing automated password synchronization is that it:
reduces overall administrative workload.
Which of the following tools is MOST appropriate to assess whether information security governance objectives are being met?
Balanced scorecard
Which of the following is MOST effective in preventing the introduction of a code modification that may reduce the security of a critical business application?
Change management
An operating system (OS) noncritical patch to enhance system security cannot be applied because a critical application is not compatible with the change. Which of the following is the BEST solution?
Compensate for not installing the patch with mitigating controls
Which of the following is MOST important to the success of an information security program?
Senior management sponsorship
Which of the following is MOST important for a successful information security program?
Executive management commitment
Which of the following is the MOST effective solution for preventing individuals external to the organization from modifying sensitive information on a corporate database?
Screened subnets
Which of the following technologies is utilized to ensure that an individual connecting to a corporate internal network over the Internet is not an intruder masquerading as an authorized user?
Two-factor authentication
What is an appropriate frequency for updating operating system (OS) patches on production servers?
Whenever important security patches are released
Which of the following devices should be placed within a DMZ?
Application server
A border router should be placed on which of the following?
Domain boundary
An e-commerce order fulfillment web server should generally be placed on which of the following?
Demilitarized zone (DMZ)