CISM Premium Bundle

CISM Premium Bundle

Certified Information Security Manager Certification Exam

4.5 
(27480 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 15, 2024Last update

Isaca CISM Free Practice Questions

Q1. Who should drive the risk analysis for an organization? 

A. Senior management 

B. Security manager 

C. Quality manager 

D. Legal department 

Answer:

Explanation: 

Although senior management should support and sponsor a risk analysis, the know-how and the management of the project will be with the security department. Quality management and the legal department will contribute to the project. 

Q2. For virtual private network (VPN) access to the corporate network, the information security manager is requiring strong authentication. Which of the following is the strongest method 

to ensure that logging onto the network is secure? 

A. Biometrics 

B. Symmetric encryption keys 

C. Secure Sockets Layer (SSL)-based authentication 

D. Two-factor authentication 

Answer:

Explanation: 

Two-factor authentication requires more than one type of user authentication. While biometrics provides unique authentication, it is not strong by itself, unless a PIN or some other authentication factor is used with it. Biometric authentication by itself is also subject to replay attacks. A symmetric encryption method that uses the same secret key to encrypt and decrypt data is not a typical authentication mechanism for end users. This private key could still be compromised. SSL is the standard security technology for establishing an encrypted link between a web server and a browser. SSL is not an authentication mechanism. If SSL is used with a client certificate and a password, it would be a two-factor authentication. 

Q3. During which phase of development is it MOST appropriate to begin assessing the risk of a new application system? 

A. Feasibility 

B. Design 

C. Development 

D. Testing 

Answer:

Explanation: 

Risk should be addressed as early in the development of a new application system as possible. In some cases, identified risks could be mitigated through design changes. If needed changes are not identified until design has already commenced, such changes become more expensive. For this reason, beginning risk assessment during the design, development or testing phases is not the best solution. 

Q4. When residual risk is minimized: 

A. acceptable risk is probable. 

B. transferred risk is acceptable. 

C. control risk is reduced. 

D. risk is transferable. 

Answer:

Explanation: 

Since residual risk is the risk that remains after putting into place an effective risk management program, it is probable that the organization will decide that it is an acceptable risk if sufficiently minimized. Transferred risk is risk that has been assumed by a third party, therefore its magnitude is not relevant. Accordingly, choices B and D are incorrect since transferred risk does not necessarily indicate whether risk is at an acceptable level. Minimizing residual risk will not reduce control risk. 

Q5. What would be the MOST significant security risks when using wireless local area network (LAN) technology? 

A. Man-in-the-middle attack 

B. Spoofing of data packets 

C. Rogue access point 

D. Session hijacking 

Answer:

Explanation: 

A rogue access point masquerades as a legitimate access point The risk is that legitimate users may connect through this access point and have their traffic monitored. All other choices are not dependent on the use of a wireless local area network (LAN) technology. 

Q6. Which of the following controls would BEST prevent accidental system shutdown from the console or operations area? 

A. Redundant power supplies 

B. Protective switch covers 

C. Shutdown alarms 

D. Biometric readers 

Answer:

Explanation: 

Protective switch covers would reduce the possibility of an individual accidentally pressing the power button on a device, thereby turning off the device. Redundant power supplies would not prevent an individual from powering down a device. Shutdown alarms would be after the fact. Biometric readers would be used to control access to the systems. 

Q7. Which of the following is the MOST important information to include in an information security standard? 

A. Creation date 

B. Author name 

C. Initial draft approval date 

D. Last review date 

Answer:

Explanation: 

The last review date confirms the currency of the standard, affirming that management has reviewed the standard to assure that nothing in the environment has changed that would necessitate an update to the standard. The name of the author as well as the creation and draft dates are not that important. 

Q8. The BEST protocol to ensure confidentiality of transmissions in a business-to-customer (B2C) financial web application is: 

A. Secure Sockets Layer (SSL). 

B. Secure Shell (SSH). 

C. IP Security (IPSec). 

D. Secure/Multipurpose Internet Mail Extensions (S/MIME ). 

Answer:

Explanation: 

Secure Sockets Layer (SSL) is a cryptographic protocol that provides secure communications providing end point authentication and communications privacy over the Internet. In typical use, all data transmitted between the customer and the business are, therefore, encrypted by the business's web server and remain confidential. SSH File Transfer Protocol (SFTP) is a network protocol that provides file transfer and manipulation functionality over any reliable data stream. It is typically used with the SSH-2 protocol to provide secure file transfer. IP Security (IPSec) is a standardized framework for securing Internet Protocol (IP) communications by encrypting and/or authenticating each IP packet in a data stream. There are two modes of IPSec operation: transport mode and tunnel mode. Secure/Multipurpose Internet Mail Extensions (S/MIME) is a standard for public key encryption and signing of e-mail encapsulated in MIME; it is not a web transaction protocol. 

Q9. hen personal information is transmitted across networks, there MUST be adequate controls over: 

A. change management. 

B. privacy protection. 

C. consent to data transfer. 

D. encryption devices. 

Answer:

Explanation: 

Privacy protection is necessary to ensure that the receiving party has the appropriate level of protection of personal data. Change management primarily protects only the information, not the privacy of the individuals. Consent is one of the protections that is frequently, but not always, required. Encryption is a method of achieving the actual control, but controls over the devices may not ensure adequate privacy protection and. therefore, is a partial answer. 

Q10. In order to highlight to management the importance of integrating information security in the business processes, a newly hired information security officer should FIRST: 

A. prepare a security budget. 

B. conduct a risk assessment. 

C. develop an information security policy. 

D. obtain benchmarking information. 

Answer:

Explanation: 

Risk assessment, evaluation and impact analysis will be the starting point for driving management's attention to information security. All other choices will follow the risk assessment. 

Q11. A project manager is developing a developer portal and requests that the security manager assign a public IP address so that it can be accessed by in-house staff and by external consultants outside the organization's local area network (LAN). What should the security manager do FIRST? 

A. Understand the business requirements of the developer portal 

B. Perform a vulnerability assessment of the developer portal 

C. Install an intrusion detection system (IDS) 

D. Obtain a signed nondisclosure agreement (NDA) from the external consultants before allowing external access to the server 

Answer:

Explanation: 

The information security manager cannot make an informed decision about the request without first understanding the business requirements of the developer portal. Performing a vulnerability assessment of developer portal and installing an intrusion detection system (IDS) are best practices but are subsequent to understanding the requirements. Obtaining a signed nondisclosure agreement will not take care of the risks inherent in the organization's application. 

Q12. When implementing effective security governance within the requirements of the company's security strategy, which of the following is the MOST important factor to consider? 

A. Preserving the confidentiality of sensitive data 

B. Establishing international security standards for data sharing 

C. Adhering to corporate privacy standards 

D. Establishing system manager responsibility for information security 

Answer:

Explanation: 

The goal of information security is to protect the organization's information assets. International security standards are situational, depending upon the company and its business. Adhering to corporate privacy standards is important, but those standards must be appropriate and adequate and are not the most important factor to consider. All employees are responsible for information security, but it is not the most important factor to consider. 

Q13. Which of the following requirements would have the lowest level of priority in information security? 

A. Technical 

B. Regulatory 

C. Privacy 

D. Business 

Answer:

Explanation: 

Information security priorities may, at times, override technical specifications, which then must be rewritten to conform to minimum security standards. Regulatory and privacy requirements are government-mandated and, therefore, not subject to override. The needs of the business should always take precedence in deciding information security priorities. 

Q14. Which of the following would be MOST effective in successfully implementing restrictive password policies? 

A. Regular password audits 

B. Single sign-on system 

C. Security awareness program 

D. Penalties for noncompliance 

Answer:

Explanation: 

To be successful in implementing restrictive password policies, it is necessary to obtain the buy-in of the end users. The best way to accomplish this is through a security awareness program. Regular password audits and penalties for noncompliance would not be as effective on their own; people would go around them unless forced by the system. Single sign-on is a technology solution that would enforce password complexity but would not promote user compliance. For the effort to be more effective, user buy-in is important. 

Q15. Information security governance is PRIMARILY driven by: 

A. technology constraints. 

B. regulatory requirements. 

C. litigation potential. 

D. business strategy. 

Answer:

Explanation: 

Governance is directly tied to the strategy and direction of the business. Technology constraints, regulatory requirements and litigation potential are all important factors, but they are necessarily in line with the business strategy. 

START CISM EXAM