CISM Flashcards

1
Q

What is the BEST method to verify that all security patches applied to servers were properly documented?

A

Trace OS patch logs to change control requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is responsible for raising awareness of the need for adequate funding to support risk mitigation plans?

A

Information security manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An information security manager must understand the relationship between information security and business operations in order to:

A. support organizational objectives.
B. determine likely areas of noncompliance.
C. assess the possible impacts of compromise.
D. understand the threats to the business.

A

Correct A. support organizational objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following, using public key cryptography, ensures authentication, confidentiality and nonrepudiation of a message?

A

Encrypting by the sender’s private key ensures authentication. By being able to decrypt with the sender’s public key, the receiver would know that the message is sent by the sender only and the sender cannot deny/repudiate the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The PRIMARY goal of developing an information security program is to:

A

The development of an information security program is usually seen as a manifestation of the information security strategy. Thus, the goal of developing the information security program is to implement the strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An internal review of a web-based application system finds the ability to gain access to all employees’ accounts by changing the employee’s ID on the URL used for accessing the account. The vulnerability identified is:

A

The authentication process is broken because, although the session is valid, the application should reauthenticate when the input parameters are changed. The review provided valid employee IDs, and valid input was processed. The problem here is the lack of reauthentication when the input parameters are changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following BEST indicates senior management commitment toward supporting information security?

A

Management sign-off on risk management methodology helps in performing the entire risk cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Minimum standards for securing the technical infrastructure should be defined in a security:

A

Minimum standards for securing the technical infrastructure should be defined in a security architecture document. This document defines how components are secured and the security services that should be in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The PRIMARY focus of information security governance is to:

A

Optimize the information security strategy to achieve business objectives.

Governance ensures that business objectives are achieved by evaluating stakeholder needs, conditions and options; setting direction through prioritization and decision making; and monitoring performance, compliance and progress against plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When performing an information risk analysis, an information security manager should FIRST:

A

Assets must be inventoried before any of the other choices can be performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following roles is MOST appropriately responsible for ensuring that security awareness and training material is effectively deployed to reach the intended audience?

A

The information security department oversees the information security program. This includes ensuring that training reaches the intended audience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When should a request for proposal (RFP) be issued?

A

Prior to developing a project budget

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Senior management commitment and support for information security can BEST be enhanced through:

A

Periodic review of alignment with business management goals.

Ensuring that security activities continue to be aligned and support business goals is critical to obtaining their support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is the MOST appropriate individual to ensure that new exposures have not been introduced into an existing application during the change management process?

A

System users, specifically the user acceptance testers, would be in the best position to note whether new exposures are introduced during the change management process. The system designer or system analyst, data security officer and operations manager would not be as closely involved in testing code changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is an indicator of effective governance?

A

A risk management program is a key component of effective governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The development of an information security program begins with:

A

an effective information security strategy.

17
Q

Which of the following is the MOST usable deliverable of an information security risk analysis?

A

Assignment of risks to process owners

18
Q

Which of the following is the PRIMARY prerequisite to implementing data classification within an organization?

A. Defining job roles
B. Performing a risk assessment
C. Identifying data owners
D. Establishing data retention policies

A

Identifying the data owners is the first step, and is essential to implementing data classification. Defining job roles is not relevant. Performing a risk assessment is important, but will require the participation of data owners (who must first be identified).

19
Q

Which of the following is the BEST tool to maintain the currency and coverage of an information security program within an organization?

A. The program’s governance oversight mechanisms
B. Information security periodicals and manuals
C. The program’s security architecture and design
D. Training and certification of the information security team

A

A. The program’s governance oversight mechanisms

20
Q

Relationships among security technologies are BEST defined through which of the following?

A. Security metrics
B. Network topology
C. Security architecture
D. Process improvement models

A

Security architecture explains the use and relationships of security mechanisms. Security metrics measure improvement within the security practice but do not explain the use and relationships of security technologies. Process improvement models and network topology diagrams also do not describe the use and relationships of these technologies.

21
Q

The BEST strategy for risk management is to:

A. achieve a balance between risk and organizational goals.
B. reduce risk to an acceptable level.
C. ensure that policy development properly considers organizational risks.
D. ensure that all unmitigated risks are accepted by management.

A

B. reduce risk to an acceptable level.

22
Q

An information security manager reviewing firewall rules will be MOST concerned if the firewall allows:

A. source routing.
B. broadcast propagation.
C. unregistered ports.
D. nonstandard protocols.

A

A. source routing.

23
Q

Obtaining senior management support for an information security initiative can BEST be accomplished by:

A. developing and presenting a business case.
B. defining the risk that will be addressed.
C. presenting a financial analysis of benefits.
D. aligning the initiative with organizational objectives.

A

developing and presenting a business case.

A business case is inclusive of the other options and includes and specifically addresses them.

24
Q

The MOST important requirement for gaining management commitment to the information security program is to:

A. benchmark a number of successful organizations.

B. demonstrate potential losses and other impacts that can result from a lack of support.

C. inform management of the legal requirements of due care.

D. demonstrate support for desired outcomes.

A

D. demonstrate support for desired outcomes.