CISM Premium Bundle

CISM Premium Bundle

Certified Information Security Manager Certification Exam

4.5 
(29580 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 15, 2024Last update

Isaca CISM Free Practice Questions

Q1. After a risk assessment study, a bank with global operations decided to continue doing business in certain regions of the world where identity theft is rampant. The information security manager should encourage the business to: 

A. increase its customer awareness efforts in those regions. 

B. implement monitoring techniques to detect and react to potential fraud. 

C. outsource credit card processing to a third party. 

D. make the customer liable for losses if they fail to follow the bank's advice. 

Answer:

Explanation: 

While customer awareness will help mitigate the risks, this is insufficient on its own to control fraud risk. Implementing monitoring techniques which will detect and deal with potential fraud cases is the most effective way to deal with this risk. If the bank outsources its processing, the bank still retains liability. While making the customer liable for losses is a possible approach, nevertheless, the bank needs to be seen to be proactive in managing its risks. 

Q2. Which of the following is the MOST usable deliverable of an information security risk analysis? 

A. Business impact analysis (BIA) report 

B. List of action items to mitigate risk 

C. Assignment of risks to process owners 

D. Quantification of organizational risk 

Answer:

Explanation: 

Although all of these are important, the list of action items is used to reduce or transfer the current level of risk. The other options materially contribute to the way the actions are implemented. 

Q3. Which of the following is an advantage of a centralized information security organizational structure? 

A. It is easier to promote security awareness. 

B. It is easier to manage and control. 

C. It is more responsive to business unit needs. 

D. It provides a faster turnaround for security requests. 

Answer:

Explanation: 

It is easier to manage and control a centralized structure. Promoting security awareness is an advantage of decentralization. Decentralization allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. Decentralized operations allow security administrators to be more responsive. Being close to the business allows decentralized security administrators to achieve a faster turnaround than that achieved in a centralized operation. 

Q4. An organization has to comply with recently published industry regulatory requirements—compliance that potentially has high implementation costs. What should the information security manager do FIRST? 

A. Implement a security committee. 

B. Perform a gap analysis. 

C. Implement compensating controls. 

D. Demand immediate compliance. 

Answer:

Explanation: 

Since they are regulatory requirements, a gap analysis would be the first step to determine the level of compliance already in place. Implementing a security committee or compensating controls would not be the first step. Demanding immediate compliance would not assess the situation. 

Q5. An outcome of effective security governance is: 

A. business dependency assessment 

B. strategic alignment. 

C. risk assessment. 

D. planning. 

Answer:

Explanation: 

Business dependency assessment is a process of determining the dependency of a business on certain information resources. It is not an outcome or a product of effective security management. Strategic alignment is an outcome of effective security governance. Where there is good governance, there is likely to be strategic alignment. Risk assessment is not an outcome of effective security governance; it is a process. Planning comes at the beginning of effective security governance, and is not an outcome but a process. 

Q6. On a company's e-commerce web site, a good legal statement regarding data privacy should include: 

A. a statement regarding what the company will do with the information it collects. 

B. a disclaimer regarding the accuracy of information on its web site. 

C. technical information regarding how information is protected. 

D. a statement regarding where the information is being hosted. 

Answer:

Explanation: 

Most privacy laws and regulations require disclosure on how information will be used. A disclaimer is not necessary since it does not refer to data privacy. Technical details regarding how information is protected are not mandatory to publish on the web site and in fact would not be desirable. It is not mandatory to say where information is being hosted. 

Q7. A risk analysis should: 

A. include a benchmark of similar companies in its scope. 

B. assume an equal degree of protection for all assets. 

C. address the potential size and likelihood of loss. 

D. give more weight to the likelihood vs. the size of the loss. 

Answer:

Explanation: 

A risk analysis should take into account the potential size and likelihood of a loss. It could include comparisons with a group of companies of similar size. It should not assume an equal degree of protection for all assets since assets may have different risk factors. The likelihood of the loss should not receive greater emphasis than the size of the loss; a risk analysis should always address both equally. 

Q8. Temporarily deactivating some monitoring processes, even if supported by an acceptance of operational risk, may not be acceptable to the information security manager if: 

A. it implies compliance risks. 

B. short-term impact cannot be determined. 

C. it violates industry security practices. 

D. changes in the roles matrix cannot be detected. 

Answer:

Explanation: 

Monitoring processes are also required to guarantee fulfillment of laws and regulations of the organization and, therefore, the information security manager will be obligated to comply with the law. Choices B and C are evaluated as part of the operational risk. Choice D is unlikely to be as critical a breach of regulatory legislation. The acceptance of operational risks overrides choices B, C and D. 

Q9. An information security organization should PRIMARILY: 

A. support the business objectives of the company by providing security-related support services. 

B. be responsible for setting up and documenting the information security responsibilities of the information security team members. 

C. ensure that the information security policies of the company are in line with global best practices and standards. 

D. ensure that the information security expectations are conveyed to employees. 

Answer:

Explanation: 

The information security organization is responsible for options B and D within an organization, but they are not its primary mission. Reviewing and adopting appropriate standards (option C) is a requirement. The primary objective of an information security organization is to ensure that security supports the overall business objectives of the company. 

Q10. The MOST appropriate role for senior management in supporting information security is the: 

A. evaluation of vendors offering security products. 

B. assessment of risks to the organization. 

C. approval of policy statements and funding. 

D. monitoring adherence to regulatory requirements. 

Answer:

Explanation: 

Since the members of senior management are ultimately responsible for information security, they are the ultimate decision makers in terms of governance and direction. They are responsible for approval of major policy statements and requests to fund the information security practice. Evaluation of vendors, assessment of risks and monitoring compliance with regulatory requirements are day-to-day responsibilities of the information security manager; in some organizations, business management is involved in these other activities, though their primary role is direction and governance. 

Q11. The FIRST step to create an internal culture that focuses on information security is to: 

A. implement stronger controls. 

B. conduct periodic awareness training. 

C. actively monitor operations. 

D. gain the endorsement of executive management. 

Answer:

Explanation: 

Endorsement of executive management in the form of policies provides direction and awareness. The implementation of stronger controls may lead to circumvention. Awareness training is important, but must be based on policies. Actively monitoring operations will not affect culture at all levels. 

Q12. The MOST important component of a privacy policy is: 

A. notifications. 

B. warranties. 

C. liabilities. 

D. geographic coverage. 

Answer:

Explanation: 

Privacy policies must contain notifications and opt-out provisions: they are a high-level management statement of direction. They do not necessarily address warranties, liabilities or geographic coverage, which are more specific. 

Q13. Which of the following will BEST prevent external security attacks? 

A. Static IP addressing 

B. Network address translation 

C. Background checks for temporary employees 

D. Securing and analyzing system access logs 

Answer:

Explanation: 

Network address translation is helpful by having internal addresses that are nonroutable. Background checks of temporary employees are more likely to prevent an attack launched from within the enterprise. Static IP addressing does little to prevent an attack. Writing all computer logs to removable media does not help in preventing an attack. 

Q14. A security manager is preparing a report to obtain the commitment of executive management to a security program. Inclusion of which of the following would be of MOST value? 

A. Examples of genuine incidents at similar organizations 

B. Statement of generally accepted best practices 

C. Associating realistic threats to corporate objectives 

D. Analysis of current technological exposures 

Answer:

Explanation: 

Linking realistic threats to key business objectives will direct executive attention to them. All other options are supportive but not of as great a value as choice C when trying to obtain the funds for a new program. 

Q15. Identification and prioritization of business risk enables project managers to: 

A. establish implementation milestones. 

B. reduce the overall amount of slack time. 

C. address areas with most significance. 

D. accelerate completion of critical paths. 

Answer:

Explanation: 

Identification and prioritization of risk allows project managers to focus more attention on areas of greater importance and impact. It will not reduce the overall amount of slack time, facilitate establishing implementation milestones or allow a critical path to be completed any sooner. 

START CISM EXAM