CISM Premium Bundle

CISM Premium Bundle

Certified Information Security Manager Certification Exam

4.5 
(26880 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 15, 2024Last update

Isaca CISM Free Practice Questions

Q1. There is a time lag between the time when a security vulnerability is first published, and the time when a patch is delivered. Which of the following should be carried out FIRST to mitigate the risk during this time period? 

A. Identify the vulnerable systems and apply compensating controls 

B. Minimize the use of vulnerable systems 

C. Communicate the vulnerability to system users 

D. Update the signatures database of the intrusion detection system (IDS) 

Answer:

Explanation: 

The best protection is to identify the vulnerable systems and apply compensating controls until a patch is installed. Minimizing the use of vulnerable systems and communicating the vulnerability to system users could be compensating controls but would not be the first course of action. Choice D does not make clear the timing of when the intrusion detection system (IDS) signature list would be updated to accommodate the vulnerabilities that are not yet publicly known. Therefore, this approach should not always be considered as the first option. 

Q2. What mechanisms are used to identify deficiencies that would provide attackers with an opportunity to compromise a computer system? 

A. Business impact analyses 

B. Security gap analyses 

C. System performance metrics 

D. Incident response processes 

Answer:

Explanation: 

A security gap analysis is a process which measures all security controls in place against typically good business practice, and identifies related weaknesses. A business impact analysis is less suited to identify security deficiencies. System performance metrics may indicate security weaknesses, but that is not their primary purpose. Incident response processes exist for cases where security weaknesses are exploited. 

Q3. The data access requirements for an application should be determined by the: 

A. legal department. 

B. compliance officer. 

C. information security manager. 

D. business owner. 

Answer:

Explanation: 

Business owners are ultimately responsible for their applications. The legal department, compliance officer and information security manager all can advise, but do not have final responsibility. 

Q4. What is the BEST technique to determine which security controls to implement with a limited budget? 

A. Risk analysis 

B. Annualized loss expectancy (ALE) calculations 

C. Cost-benefit analysis 

D. Impact analysis 

Answer:

Explanation: 

Cost-benefit analysis is performed to ensure that the cost of a safeguard does not outweigh it's benefit and that the best safeguard is provided for the cost of implementation. Risk analysis identifies the risks and suggests appropriate mitigation. The annualized loss expectancy (ALE) is a subset of a cost-benefit analysis. Impact analysis would indicate how 

much could be lost if a specific threat occurred. 

Q5. An outsource service provider must handle sensitive customer information. Which of the following is MOST important for an information security manager to know? 

A. Security in storage and transmission of sensitive data 

B. Provider's level of compliance with industry standards 

C. Security technologies in place at the facility 

D. Results of the latest independent security review 

Answer:

Explanation: 

Mow the outsourcer protects the storage and transmission of sensitive information will allow an information security manager to understand how sensitive data will be protected. Choice B is an important but secondary consideration. Choice C is incorrect because security technologies are not the only components to protect the sensitive customer information. Choice D is incorrect because an independent security review may not include analysis on how sensitive customer information would be protected.

Q6. When the computer incident response team (CIRT) finds clear evidence that a hacker has penetrated the corporate network and modified customer information, an information security manager should FIRST notify: 

A. the information security steering committee. 

B. customers who may be impacted. 

C. data owners who may be impacted. 

D. regulatory- agencies overseeing privacy. 

Answer:

Explanation: 

The data owners should be notified first so they can take steps to determine the extent of the damage and coordinate a plan for corrective action with the computer incident response team. Other parties will be notified later as required by corporate policy and regulatory requirements. 

Q7. Primary direction on the impact of compliance with new regulatory requirements that may lead to major application system changes should be obtained from the: 

A. corporate internal auditor. 

B. System developers/analysts. 

C. key business process owners. 

D. corporate legal counsel. 

Answer:

Explanation: 

Business process owners are in the best position to understand how new regulatory requirements may affect their systems. Legal counsel and infrastructure management, as well as internal auditors, would not be in as good a position to fully understand all ramifications. 

Q8. A successful risk management program should lead to: 

A. optimization of risk reduction efforts against cost. 

B. containment of losses to an annual budgeted amount. 

C. identification and removal of all man-made threats. 

D. elimination or transference of all organizational risks. 

Answer:

Explanation: 

Successful risk management should lead to a breakeven point of risk reduction and cost. The other options listed are not achievable. Threats cannot be totally removed or transferred, while losses cannot be budgeted in advance with absolute certainty. 

Q9. An information security manager at a global organization has to ensure that the local information security program will initially ensure compliance with the: 

A. corporate data privacy policy. 

B. data privacy policy where data are collected. 

C. data privacy policy of the headquarters' country. 

D. data privacy directive applicable globally. 

Answer:

Explanation: 

As a subsidiary, the local entity will have to comply with the local law for data collected in the country. Senior management will be accountable for this legal compliance. The policy, being internal, cannot supersede the local law. Additionally, with local regulations differing from the country in which the organization is headquartered, it is improbable that a group wide policy will address all the local legal requirements. In case of data collected locally (and potentially transferred to a country with a different data privacy regulation), the local law applies, not the law applicable to the head office. The data privacy laws are country-specific. 

Q10. Which of the following is the MOST important risk associated with middleware in a client-server environment? 

A. Server patching may be prevented 

B. System backups may be incomplete 

C. System integrity may be affected 

D. End-user sessions may be hijacked 

Answer:

Explanation: 

The major risk associated with middleware in a client-server environment is that system integrity may be adversely affected because of the very purpose of middleware, which is intended to support multiple operating environments interacting concurrently. Lack of proper software to control portability of data or programs across multiple platforms could result in a loss of data or program integrity. All other choices are less likely to occur. 

Q11. Which of the following techniques MOST clearly indicates whether specific risk-reduction controls should be implemented? 

A. Countermeasure cost-benefit analysis 

B. Penetration testing 

C. Frequent risk assessment programs 

D. Annual loss expectancy (ALE) calculation 

Answer:

Explanation: 

In a countermeasure cost-benefit analysis, the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure. Penetration testing may indicate the extent of a weakness but, by itself, will not establish the cost/benefit of a control. Frequent risk assessment programs will certainly establish what risk exists but will not determine the maximum cost of controls. Annual loss expectancy (ALE) is a measure which will contribute to the value of the risk but. alone, will not justify a control. 

Q12. Which of the following is MOST important to understand when developing a meaningful information security strategy? 

A. Regulatory environment 

B. International security standards 

C. Organizational risks 

D. Organizational goals 

Answer:

Explanation: 

Alignment of security with business objectives requires an understanding of what an organization is trying to accomplish. The other choices are all elements that must be considered, but their importance is secondary and will vary depending on organizational goals. 

Q13. The purpose of a corrective control is to: 

A. reduce adverse events. 

B. indicate compromise. 

C. mitigate impact. 

D. ensure compliance. 

Answer:

Explanation: 

Corrective controls serve to reduce or mitigate impacts, such as providing recovery capabilities. Preventive controls reduce adverse events, such as firewalls. Compromise can be detected by detective controls, such as intrusion detection systems (IDSs). Compliance could be ensured by preventive controls, such as access controls. 

Q14. Before conducting a formal risk assessment of an organization's information resources, an information security manager should FIRST: 

A. map the major threats to business objectives. 

B. review available sources of risk information. 

C. identify the value of the critical assets. 

D. determine the financial impact if threats materialize. 

Answer:

Explanation: 

Risk mapping or a macro assessment of the major threats to the organization is a simple first step before performing a risk assessment. Compiling all available sources of risk information is part of the risk assessment. Choices C and D are also components of the risk assessment process, which are performed subsequent to the threats-business mapping. 

Q15. The service level agreement (SLA) for an outsourced IT function does not reflect an 

adequate level of protection. In this situation an information security manager should: 

A. ensure the provider is made liable for losses. 

B. recommend not renewing the contract upon expiration. 

C. recommend the immediate termination of the contract. 

D. determine the current level of security. 

Answer:

Explanation: 

It is important to ensure that adequate levels of protection are written into service level agreements (SLAs) and other outsourcing contracts. Information must be obtained from providers to determine how that outsource provider is securing information assets prior to making any recommendation or taking any action in order to support management decision making. Choice A is not acceptable in most situations and therefore not a good answer. 

START CISM EXAM