CISM Practice C Topic 4 Flashcards
The BEST way to ensure that security settings on each platform are in compliance with information security policies and procedures is to:
establish security baselines.
A web-based business application is being migrated from test to production. Which of the following is the MOST important management signoff for this migration?
User
The BEST way to ensure that information security policies are followed is to:
perform periodic reviews for compliance.
The MOST appropriate individual to determine the level of information security needed for a specific business application is the:
system data owner.
Which of the following will MOST likely reduce the chances of an unauthorized individual gaining access to computing resources by pretending to be an authorized individual needing to have his or her password reset?
Conducting security awareness programs
Which of the following is the MOST likely to change an organization’s culture to one that is more security conscious?
Security awareness campaigns
The BEST way to ensure that an external service provider complies with organizational security policies is to:
Perform periodic reviews of the service provider.
When an emergency security patch is received via electronic mail, the patch should FIRST be:
validated to ensure its authenticity.
In a well-controlled environment, which of the following activities is MOST likely to lead to the introduction of weaknesses in security software?
Changing access rules
Which of the following is the BEST indicator that security awareness training has been effective?
More incidents are being reported
Which of the following metrics would be the MOST useful in measuring how well information security is monitoring violation logs?
Penetration attempts investigated
Which of the following change management activities would be a clear indicator that normal operational procedures require examination?
emergency change requests.
Which of the following is the MOST important management signoff for migrating an order processing system from a test environment to a production environment?
User
Prior to having a third party perform an attack and penetration test against an organization, the MOST important action is to ensure that:
goals and objectives are clearly defined.
When a departmental system continues to be out of compliance with an information security policy’s password strength requirements, the BEST action to undertake is to:
conduct an impact analysis to quantify the risks.
Which of the following is MOST important to the successful promotion of good security management practices?
Management support
Which of the following environments represents the GREATEST risk to organizational security?
Locally managed file server
Nonrepudiation can BEST be assured by using:
digital signatures.
Of the following, the BEST method for ensuring that temporary employees do not receive excessive access rights is:
role-based access controls.
Which of the following areas is MOST susceptible to the introduction of security weaknesses?
Configuration management
Security policies should be aligned MOST closely with:
organizational needs.
The BEST way to determine if an anomaly-based intrusion detection system (IDS) is properly installed is to:
simulate an attack and review IDS performance.
The BEST time to perform a penetration test is after:
various infrastructure changes are made.
Successful social engineering attacks can BEST be prevented through:
periodic awareness training.