CISM Premium Bundle

CISM Premium Bundle

Certified Information Security Manager Certification Exam

4.5 
(29430 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 15, 2024Last update

Isaca CISM Free Practice Questions

Q1. Information security managers should use risk assessment techniques to: 

A. justify selection of risk mitigation strategies. 

B. maximize the return on investment (ROD. 

C. provide documentation for auditors and regulators. 

D. quantify risks that would otherwise be subjective. 

Answer:

Explanation: 

Information security managers should use risk assessment techniques to justify and implement a risk mitigation strategy as efficiently as possible. None of the other choices accomplishes that task, although they are important components. 

Q2. Which of the following would be the BEST option to improve accountability for a system administrator who has security functions? 

A. Include security responsibilities in the job description 

B. Require the administrator to obtain security certification 

C. Train the system administrator on penetration testing and vulnerability assessment 

D. Train the system administrator on risk assessment 

Answer:

Explanation: 

The first step to improve accountability is to include security responsibilities in a job description. This documents what is expected and approved by the organization. The other choices are methods to ensure that the system administrator has the training to fulfill the responsibilities included in the job description. 

Q3. Which of the following is the MOST important requirement for setting up an information security infrastructure for a new system? 

A. Performing a business impact analysis (BIA) 

B. Considering personal information devices as pan of the security policy 

C. Initiating IT security training and familiarization 

D. Basing the information security infrastructure on risk assessment 

Answer:

Explanation: 

The information security infrastructure should be based on risk. While considering personal information devices as part of the security policy may be a consideration, it is not the most important requirement. A BIA is typically carried out to prioritize business processes as part of a business continuity plan. Initiating IT security training may not be important for the purpose of the information security infrastructure. 

Q4. Which of the following roles is PRIMARILY responsible for determining the information 

classification levels for a given information asset? 

A. Manager 

B. Custodian 

C. User 

D. Owner 

Answer:

Explanation: 

Although the information owner may be in a management position and is also considered a user, the information owner role has the responsibility for determining information classification levels. Management is responsible for higher-level issues such as providing and approving budget, supporting activities, etc. The information custodian is responsible for day-to-day security tasks such as protecting information, backing up information, etc. Users are the lowest level. They use the data, but do not classify the data. The owner classifies the data. 

Q5. Who in an organization has the responsibility for classifying information? 

A. Data custodian 

B. Database administrator 

C. Information security officer 

D. Data owner 

Answer:

Explanation: 

The data owner has full responsibility over data. The data custodian is responsible for securing the information. The database administrator carries out the technical administration. The information security officer oversees the overall classification management of the information. 

Q6. Effective IT governance is BEST ensured by: 

A. utilizing a bottom-up approach. 

B. management by the IT department. 

C. referring the matter to the organization's legal department. 

D. utilizing a top-down approach. 

Answer:

Explanation: 

Effective IT governance needs to be a top-down initiative, with the board and executive management setting clear policies, goals and objectives and providing for ongoing monitoring of the same. Focus on the regulatory issues and management priorities may not be reflected effectively by a bottom-up approach. IT governance affects the entire organization and is not a matter concerning only the management of IT. The legal department is part of the overall governance process, but cannot take full responsibility. 

Q7. A successful information security management program should use which of the following to determine the amount of resources devoted to mitigating exposures? 

A. Risk analysis results 

B. Audit report findings 

C. Penetration test results 

D. Amount of IT budget available 

Answer:

Explanation: 

Risk analysis results are the most useful and complete source of information for determining the amount of resources to devote to mitigating exposures. Audit report findings may not address all risks and do not address annual loss frequency. Penetration test results provide only a limited view of exposures, while the IT budget is not tied to the exposures faced by the organization. 

Q8. When a security standard conflicts with a business objective, the situation should be resolved by: 

A. changing the security standard. 

B. changing the business objective. 

C. performing a risk analysis. 

D. authorizing a risk acceptance. 

Answer:

Explanation: 

Conflicts of this type should be based on a risk analysis of the costs and benefits of allowing or disallowing an exception to the standard. It is highly improbable that a business objective could be changed to accommodate a security standard, while risk acceptance* is a process that derives from the risk analysis. 

Q9. The MOST important factor in planning for the long-term retention of electronically stored business records is to take into account potential changes in: 

A. storage capacity and shelf life. 

B. regulatory and legal requirements. 

C. business strategy and direction. 

D. application systems and media. 

Answer:

Explanation: 

Long-term retention of business records may be severely impacted by changes in application systems and media. For example, data stored in nonstandard formats that can only be read and interpreted by previously decommissioned applications may be difficult, if not impossible, to recover. Business strategy and direction do not generally apply, nor do legal and regulatory requirements. Storage capacity and shelf life are important but secondary issues. 

Q10. Which of the following would be MOST useful in developing a series of recovery time objectives (RTOs)? 

A. Gap analysis 

B. Regression analysis 

C. Risk analysis 

D. Business impact analysis 

Answer:

Explanation: 

Recovery time objectives (RTOs) are a primary deliverable of a business impact analysis. RTOs relate to the financial impact of a system not being available. A gap analysis is useful in addressing the differences between the current state and an ideal future state. Regression analysis is used to test changes to program modules. Risk analysis is a component of the business impact analysis. 

Q11. Which of the following would be of GREATEST importance to the security manager in determining whether to accept residual risk? 

A. Historical cost of the asset 

B. Acceptable level of potential business impacts 

C. Cost versus benefit of additional mitigating controls 

D. Annualized loss expectancy (ALE) 

Answer:

Explanation: 

The security manager would be most concerned with whether residual risk would be reduced by a greater amount than the cost of adding additional controls. The other choices, although relevant, would not be as important. 

Q12. Which of the following MOST commonly falls within the scope of an information security governance steering committee? 

A. Interviewing candidates for information security specialist positions 

B. Developing content for security awareness programs 

C. Prioritizing information security initiatives 

D. Approving access to critical financial systems 

Answer:

Explanation: 

Prioritizing information security initiatives is the only appropriate item. The interviewing of specialists should be performed by the information security manager, while the developing of program content should be performed by the information security staff. Approving access to critical financial systems is the responsibility of individual system data owners. 

Q13. The PRIMARY reason for initiating a policy exception process is when: 

A. operations are too busy to comply. 

B. the risk is justified by the benefit. 

C. policy compliance would be difficult to enforce. 

D. users may initially be inconvenienced. 

Answer:

Explanation: 

Exceptions to policy are warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits. Being busy is not a justification for policy exceptions, nor is the fact that compliance cannot be enforced. User inconvenience is not a reason to automatically grant exception to a policy. 

Q14. Which of the following would be the BEST metric for the IT risk management process? 

A. Number of risk management action plans 

B. Percentage of critical assets with budgeted remedial 

C. Percentage of unresolved risk exposures 

D. Number of security incidents identified 

Answer:

Explanation: 

Percentage of unresolved risk exposures and the number of security incidents identified contribute to the IT risk management process, but the percentage of critical assets with budgeted remedial is the most indicative metric. Number of risk management action plans is not useful for assessing the quality of the process. 

Q15. When an organization hires a new information security manager, which of the following goals should this individual pursue FIRST? 

A. Develop a security architecture 

B. Establish good communication with steering committee members 

C. Assemble an experienced staff 

D. Benchmark peer organizations 

Answer:

Explanation: 

New information security managers should seek to build rapport and establish lines of communication with senior management to enlist their support. Benchmarking peer organizations is beneficial to better understand industry best practices, but it is secondary to obtaining senior management support. Similarly, developing a security architecture and assembling an experienced staff are objectives that can be obtained later. 

START CISM EXAM