CISM Practice C Topic 4 Flashcards
The BEST way to ensure that security settings on each platform are in compliance with information security policies and procedures is to:
establish security baselines.
A web-based business application is being migrated from test to production. Which of the following is the MOST important management signoff for this migration?
User
The BEST way to ensure that information security policies are followed is to:
perform periodic reviews for compliance.
The MOST appropriate individual to determine the level of information security needed for a specific business application is the:
system data owner.
Which of the following will MOST likely reduce the chances of an unauthorized individual gaining access to computing resources by pretending to be an authorized individual needing to have his or her password reset?
Conducting security awareness programs
Which of the following is the MOST likely to change an organization’s culture to one that is more security conscious?
Security awareness campaigns
The BEST way to ensure that an external service provider complies with organizational security policies is to:
Perform periodic reviews of the service provider.
When an emergency security patch is received via electronic mail, the patch should FIRST be:
validated to ensure its authenticity.
In a well-controlled environment, which of the following activities is MOST likely to lead to the introduction of weaknesses in security software?
Changing access rules
Which of the following is the BEST indicator that security awareness training has been effective?
More incidents are being reported
Which of the following metrics would be the MOST useful in measuring how well information security is monitoring violation logs?
Penetration attempts investigated
Which of the following change management activities would be a clear indicator that normal operational procedures require examination?
emergency change requests.
Which of the following is the MOST important management signoff for migrating an order processing system from a test environment to a production environment?
User
Prior to having a third party perform an attack and penetration test against an organization, the MOST important action is to ensure that:
goals and objectives are clearly defined.
When a departmental system continues to be out of compliance with an information security policy’s password strength requirements, the BEST action to undertake is to:
conduct an impact analysis to quantify the risks.
Which of the following is MOST important to the successful promotion of good security management practices?
Management support
Which of the following environments represents the GREATEST risk to organizational security?
Locally managed file server
Nonrepudiation can BEST be assured by using:
digital signatures.
Of the following, the BEST method for ensuring that temporary employees do not receive excessive access rights is:
role-based access controls.
Which of the following areas is MOST susceptible to the introduction of security weaknesses?
Configuration management
Security policies should be aligned MOST closely with:
organizational needs.
The BEST way to determine if an anomaly-based intrusion detection system (IDS) is properly installed is to:
simulate an attack and review IDS performance.
The BEST time to perform a penetration test is after:
various infrastructure changes are made.
Successful social engineering attacks can BEST be prevented through:
periodic awareness training.
What is the BEST way to ensure that an intruder who successfully penetrates a network will be detected before significant damage is inflicted?
Install a honeypot on the network
Which of the following presents the GREATEST threat to the security of an enterprise resource planning (ERP) system?
Operating system (OS) security patches have not been applied
In a social engineering scenario, which of the following will MOST likely reduce the likelihood of an unauthorized individual gaining access to computing resources?
Conducting periodic security awareness programs
Which of the following will BEST ensure that management takes ownership of the decision making process for information security?
Security-steering committees
Which of the following is the MOST appropriate individual to implement and maintain the level of information security needed for a specific business application?
Process owner
What is the BEST way to ensure that contract programmers comply with organizational security policies?
Perform periodic security reviews of the contractors
Which of the following activities is MOST likely to increase the difficulty of totally eradicating malicious code that is not immediately detected?
Backing up files
Security awareness training should be provided to new employees:
before they have access to data.
What is the BEST method to verify that all security patches applied to servers were properly documented?
Trace OS patch logs to change control requests
A security awareness program should:
address specific groups and roles.
The PRIMARY objective of security awareness is to:
influence employee behavior.
Which of the following will BEST protect against malicious activity by a former employee?
Effective termination procedures
Which of the following represents a PRIMARY area of interest when conducting a penetration test?
Network mapping
The return on investment of information security can BEST be evaluated through which of the following?
Support of business objectives
To help ensure that contract personnel do not obtain unauthorized access to sensitive information, an information security manager should PRIMARILY:
avoid granting system administration roles.
Information security policies should:
be straightforward and easy to understand.
Which of the following is the BEST way to ensure that a corporate network is adequately secured against external attack?
Perform periodic penetration testing.
Which of the following presents the GREATEST exposure to internal attack on a network?
User passwords are encoded but not encrypted
Which of the following provides the linkage to ensure that procedures are correctly aligned with information security policy requirements?
Standards
Which of the following are the MOST important individuals to include as members of an information security steering committee?
IT management and key business process owners
Security audit reviews should PRIMARILY:
ensure that controls operate as required.
Which of the following is the MOST appropriate method to protect a password that opens a confidential file?
Out-of-band channels
What is the MOST effective access control method to prevent users from sharing files with unauthorized users?
Mandatory
Which of the following is an inherent weakness of signature-based intrusion detection systems?
New attack methods will be missed
Data owners are normally responsible for which of the following?
Determining the level of application security required
Which of the following is the MOST appropriate individual to ensure that new exposures have not been introduced into an existing application during the change management process?
System user
What is the BEST way to ensure users comply with organizational security requirements for password complexity?
Enable system-enforced password configuration
Which of the following is the MOST appropriate method for deploying operating system (OS) patches to production application servers?
Initially load the patches on a test machine
Which of the following would present the GREATEST risk to information security?
Security incidents are investigated within five business days
The PRIMARY reason for using metrics to evaluate information security is to:
enable steady improvement.
What is the BEST method to confirm that all firewall rules and router configuration settings are adequate?
Periodically perform penetration tests
Which of the following is MOST important for measuring the effectiveness of a security awareness program?
A quantitative evaluation to ensure user comprehension
Which of the following is the MOST important action to take when engaging third-party consultants to conduct an attack and penetration test?
Establish clear rules of engagement
Which of the following will BEST prevent an employee from using a USB drive to copy files from desktop computers?
Restrict the available drive allocation on all PCs
Which of the following is the MOST important area of focus when examining potential security compromise of a new wireless network?
Number of administrators
Good information security standards should:
define precise and unambiguous allowable limits.
Good information security procedures should:
be updated frequently as new software is released.
What is the MAIN drawback of e-mailing password-protected zip files across the Internet?
may be quarantined by mail filters.