CISM Premium Bundle

CISM Premium Bundle

Certified Information Security Manager Certification Exam

4.5 
(29130 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 15, 2024Last update

Isaca CISM Free Practice Questions

Q1. The criticality and sensitivity of information assets is determined on the basis of: 

A. threat assessment. 

B. vulnerability assessment. 

C. resource dependency assessment. 

D. impact assessment. 

Answer:

Explanation: 

The criticality and sensitivity of information assets depends on the impact of the probability of the threats exploiting vulnerabilities in the asset, and takes into consideration the value of the assets and the impairment of the value. Threat assessment lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value. Vulnerability assessment lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value. Resource dependency assessment provides process needs but not impact. 

Q2. Which of the following BEST describes the scope of risk analysis? 

A. Key financial systems 

B. Organizational activities 

C. Key systems and infrastructure 

D. Systems subject to regulatory compliance 

Answer:

Explanation: 

Risk analysis should include all organizational activities. It should not be limited to subsets of systems or just systems and infrastructure. 

Q3. Attackers who exploit cross-site scripting vulnerabilities take advantage of: 

A. a lack of proper input validation controls. 

B. weak authentication controls in the web application layer. 

C. flawed cryptographic secure sockets layer (SSL) implementations and short key lengths. 

D. implicit web application trust relationships. 

Answer:

Explanation: 

Cross-site scripting attacks inject malformed input. Attackers who exploit weak application authentication controls can gain unauthorized access to applications and this has little to do with cross-site scripting vulnerabilities. Attackers who exploit flawed cryptographic secure sockets layer (SSI.) implementations and short key lengths can sniff network traffic and crack keys to gain unauthorized access to information. This has little to do with cross-site scripting vulnerabilities. Web application trust relationships do not relate directly to the attack. 

Q4. What is the MAIN risk when there is no user management representation on the Information Security Steering Committee? 

A. Functional requirements are not adequately considered. 

B. User training programs may be inadequate. 

C. Budgets allocated to business units are not appropriate. 

D. Information security plans are not aligned with business requirements 

Answer:

Explanation: 

The steering committee controls the execution of the information security strategy, according to the needs of the organization, and decides on the project prioritization and the execution plan. User management is an important group that should be represented to ensure that the information security plans are aligned with the business needs. Functional requirements and user training programs are considered to be part of the projects but are not the main risks. The steering committee does not approve budgets for business units. 

Q5. Retention of business records should PRIMARILY be based on: 

A. business strategy and direction. 

B. regulatory and legal requirements. 

C. storage capacity and longevity. 

D. business ease and value analysis. 

Answer:

Explanation: 

Retention of business records is generally driven by legal and regulatory requirements. Business strategy and direction would not normally apply nor would they override legal and regulatory requirements. Storage capacity and longevity are important but secondary issues. Business case and value analysis would be secondary to complying with legal and regulatory requirements. 

Q6. The MOST important characteristic of good security policies is that they: 

A. state expectations of IT management. 

B. state only one general security mandate. 

C. are aligned with organizational goals. 

D. govern the creation of procedures and guidelines. 

Answer:

Explanation: 

The most important characteristic of good security policies is that they be aligned with organizational goals. Failure to align policies and goals significantly reduces the value provided by the policies. Stating expectations of IT management omits addressing overall organizational goals and objectives. Stating only one general security mandate is the next best option since policies should be clear; otherwise, policies may be confusing and difficult to understand. Governing the creation of procedures and guidelines is most relevant to information security standards. 

Q7. Which of the following is the MOST important prerequisite for establishing information security management within an organization? 

A. Senior management commitment 

B. Information security framework 

C. Information security organizational structure 

D. Information security policy 

Answer:

Explanation: 

Senior management commitment is necessary in order for each of the other elements to succeed. Without senior management commitment, the other elements will likely be ignored within the organization. 

Q8. What is the MOST important item to be included in an information security policy? 

A. The definition of roles and responsibilities 

B. The scope of the security program 

C. The key objectives of the security program 

D. Reference to procedures and standards of the security program 

Answer:

Explanation: 

Stating the objectives of the security program is the most important element to ensure alignment with business goals. The other choices are part of the security policy, but they are not as important. 

Q9. Which of the following steps in conducting a risk assessment should be performed FIRST? 

A. Identity business assets 

B. Identify business risks 

C. Assess vulnerabilities 

D. Evaluate key controls 

Answer:

Explanation: 

Risk assessment first requires one to identify the business assets that need to be protected before identifying the threats. The next step is to establish whether those threats represent business risk by identifying the likelihood and effect of occurrence, followed by assessing the vulnerabilities that may affect the security of the asset. This process establishes the control objectives against which key controls can be evaluated. 

Q10. Risk acceptance is a component of which of the following? 

A. Assessment 

B. Mitigation 

C. Evaluation 

D. Monitoring 

Answer:

Explanation: 

Risk acceptance is one of the alternatives to be considered in the risk mitigation process. Assessment and evaluation are components of the risk analysis process. Risk acceptance is not a component of monitoring. 

Q11. Ongoing tracking of remediation efforts to mitigate identified risks can BEST be accomplished through the use of which of the following? 

A. Tree diagrams 

B. Venn diagrams 

C. Heat charts 

D. Bar charts 

Answer:

Explanation: 

Meat charts, sometimes referred to as stoplight charts, quickly and clearly show the current status of remediation efforts. Venn diagrams show the connection between sets; tree diagrams are useful for decision analysis; and bar charts show relative size. 

Q12. In assessing risk, it is MOST essential to: 

A. provide equal coverage for all asset types. 

B. use benchmarking data from similar organizations. 

C. consider both monetary value and likelihood of loss. 

D. focus primarily on threats and recent business losses. 

Answer:

Explanation: 

A risk analysis should take into account the potential financial impact and likelihood of a loss. It should not weigh all potential losses evenly, nor should it focus primarily on recent losses or losses experienced by similar firms. Although this is important supplementary information, it does not reflect the organization's real situation. Geography and other factors come into play as well. 

Q13. Which of the following guarantees that data in a file have not changed? 

A. Inspecting the modified date of the file 

B. Encrypting the file with symmetric encryption 

C. Using stringent access control to prevent unauthorized access 

D. Creating a hash of the file, then comparing the file hashes 

Answer:

Explanation: 

A hashing algorithm can be used to mathematically ensure that data haven't been changed by hashing a file and comparing the hashes after a suspected change. 

Q14. It is MOST important that information security architecture be aligned with which of the following? 

A. Industry best practices 

B. Information technology plans 

C. Information security best practices 

D. Business objectives and goals 

Answer:

Explanation: 

Information security architecture should always be properly aligned with business goals and objectives. Alignment with IT plans or industry and security best practices is secondary by comparison. 

Q15. Which of the following is the MOST essential task for a chief information security officer (CISO) to perform? 

A. Update platform-level security settings 

B. Conduct disaster recovery test exercises 

C. Approve access to critical financial systems 

D. Develop an information security strategy paper 

Answer:

Explanation: 

Developing a strategy paper on information security would be the most appropriate. Approving access would be the job of the data owner. Updating platform-level security and conducting recovery test exercises would be less essential since these are administrative tasks. 

START CISM EXAM