CISM Practice B Topic 1 Flashcards
(140 cards)
Which of the following should be the FIRST step in developing an information security plan?
Perform a technical vulnerabilities assessment
Analyze the current business strategy
Perform a business impact analysis
Assess the current levels of security awareness
Analyze the current business strategy
Senior management commitment and support for information security can BEST be obtained through presentations that:
use illustrative examples of successful attacks.
explain the technical risks to the organization.
evaluate the organization against best security practices.
tie security risks to key business objectives.
tie security risks to key business objectives.
The MOST appropriate role for senior management in supporting information security is the:
evaluation of vendors offering security products.
assessment of risks to the organization.
approval of policy statements and funding.
monitoring adherence to regulatory requirements.
approval of policy statements and funding.
Which of the following would BEST ensure the success of information security governance within an organization?
Steering committees approve security projects
Security policy training provided to all managers
Security training available to all employees on the intranet
Steering committees enforce compliance with laws and regulations
Steering committees approve security projects
Information security governance is PRIMARILY driven by:
technology constraints.
regulatory requirements.
litigation potential.
business strategy.
business strategy.
Which of the following represents the MAJOR focus of privacy regulations?
Unrestricted data mining
Identity theft
Human rights protection
Identifiable personal data
Identifiable personal data
Investments in information security technologies should be based on:
vulnerability assessments.
value analysis.
business climate.
audit recommendations.
value analysis.
Retention of business records should PRIMARILY be based on:
business strategy and direction.
regulatory and legal requirements.
storage capacity and longevity.
business case and value analysis.
regulatory and legal requirements.
Which of the following is characteristic of centralized information security management?
More expensive to administer
Better adherence to policies
More aligned with business unit needs
Faster turnaround of requests
Better adherence to policies
Successful implementation of information security governance will FIRST require:
security awareness training.
updated security policies.
a computer incident management team.
a security architecture.
updated security policies.
Which of the following individuals would be in the BEST position to sponsor the creation of an information security steering group?
Information security manager
Chief operating officer (COO)
Internal auditor
Legal counsel
Chief operating officer (COO)
The MOST important component of a privacy policy is:
notifications.
warranties.
liabilities.
geographic coverage.
notifications.
The cost of implementing a security control should not exceed the:
annualized loss expectancy.
cost of an incident.
asset value.
implementation opportunity costs
asset value.
When a security standard conflicts with a business objective, the situation should be resolved by:
changing the security standard.
changing the business objective.
performing a risk analysis.
authorizing a risk acceptance.
performing a risk analysis.
Minimum standards for securing the technical infrastructure should be defined in a security:
strategy.
guidelines.
model.
architecture.
architecture.
Which of the following is MOST appropriate for inclusion in an information security strategy?
Business controls designated as key controls
Security processes, methods, tools and techniques
Firewall rule sets, network defaults and intrusion detection system (IDS) settings
Budget estimates to acquire specific security tools
Security processes, methods, tools and techniques
Senior management commitment and support for information security will BEST be attained by an information security manager by emphasizing:
organizational risk.
organization wide metrics.
security needs.
the responsibilities of organizational units.
organizational risk.
Which of the following roles would represent a conflict of interest for an information security manager?
Evaluation of third parties requesting connectivity
Assessment of the adequacy of disaster recovery plans
Final approval of information security policies
Monitoring adherence to physical security controls
Final approval of information security policies
Which of the following situations must be corrected FIRST to ensure successful information security governance within an organization?
The information security department has difficulty filling vacancies.
The chief information officer (CIO) approves security policy changes.
The information security oversight committee only meets quarterly.
The data center manager has final signoff on all security projects.
The data center manager has final signoff on all security projects.
Which of the following requirements would have the lowest level of priority in information security?
Technical
Regulatory
Privacy
Business
Technical
When an organization hires a new information security manager, which of the following goals should this individual pursue FIRST?
Develop a security architecture
Establish good communication with steering committee members
Assemble an experienced staff
Benchmark peer organizations
Establish good communication with steering committee members
It is MOST important that information security architecture be aligned with which of the following?
Industry best practices
Information technology plans
Information security best practices
Business objectives and goals
Business objectives and goals
Which of the following is MOST likely to be discretionary?
Policies
Procedures
Guidelines
Standards
Guidelines
Security technologies should be selected PRIMARILY on the basis of their:
ability to mitigate business risks.
evaluations in trade publications.
use of new and emerging technologies.
benefits in comparison to their costs.
ability to mitigate business risks.