CISM Study Guide Flashcards
(68 cards)
The MAIN benefit of implementing a data loss prevention (DLP) solution is to:
A. enhance the organization’s antivirus controls.
B. eliminate the risk of data loss.
C. complement the organization’s detective controls.
D. reduce the need for a security awareness program.
Answer: C
Explanation:
A data loss prevention (DLP) solution is a type of detective control that monitors and prevents
unauthorized transmission or leakage of sensitive data from the organization. A DLP solution can
enhance the organization’s antivirus controls by detecting and blocking malicious code that attempts
to exfiltrate data, but this is not its main benefit.
During which of the following phases should an incident response team document actions required
to remove the threat that caused the incident?
A. Post-incident review
B. Eradication
C. Containment
D. Identification
Answer: B
The eradication phase of incident response is the stage where the incident response team
documents and performs the actions required to remove the threat that caused the incident1. This
phase involves identifying and eliminating the root cause of the incident, such as malware,
compromised accounts, unauthorized access, or misconfigured systems2. The eradication phase also
involves restoring the affected systems to a secure state, deleting any malicious files or artifacts, and
verifying that the threat has been completely removed2. The eradication phase is the first step in
returning a compromised environment to its proper state.
Which of the following is PRIMARILY determined by asset classification?
A. Insurance coverage required for assets
B. Level of protection required for assets
C. Priority for asset replacement
D. Replacement cost of assets
Answer: B
Asset classification is the process of assigning a value to information assets based on their
importance to the organization and the potential impact of their compromise, loss or
damage1. Asset classification helps to determine the level of protection required for assets, which is
proportional to their value and sensitivity. Asset classification also facilitates risk assessment and
management, as well as compliance with legal, regulatory and contractual requirements.
ACISO learns that a third-party service provider did not notify the organization of a data breach that
affected the service provider’s data center. Which of the following should the CISO do FIRST?
A. Recommend canceling the outsourcing contract.
B. Request an independent review of the provider’s data center.
C. Notify affected customers of the data breach.
D. Determine the extent of the impact to the organization.
Answer: D
Explanation:
The CISO should first determine the extent of the impact to the organization by assessing the nature
and scope of the data breach, the type and sensitivity of the data involved, the potential harm to the
organization and its customers, and the legal and contractual obligations of the organization and the
service provider. This will help the CISO to prioritize the appropriate actions and resources to
respond to the incident and mitigate the risks.
An information security manager developing an incident response plan MUST ensure it includes:
A. an inventory of critical data.
B. criteria for escalation.
C. a business impact analysis (BIA).
D. critical infrastructure diagrams.
Answer: B
Explanation:
An incident response plan is a set of procedures and guidelines that define the roles and
responsibilities of the incident response team, the steps to follow in the event of an incident, and the
communication and escalation protocols to ensure timely and effective resolution of incidents. One
of the essential components of an incident response plan is the criteria for escalation, which specify
the conditions and thresholds that trigger the escalation of an incident to a higher level of authority
or a different function within the organization. The criteria for escalation may depend on factors such as the severity, impact, duration, scope, and complexity of the incident, as well as the availability and
capability of the incident response team. The criteria for escalation help to ensure that incidents are
handled by the appropriate personnel, that management is kept informed and involved, and that the necessary resources and support are provided to resolve the incident.
Which of the following BEST supports the incident management process for attacks on an
organization’s supply chain?
A. Including service level agreements (SLAs) in vendor contracts
B. Establishing communication paths with vendors
C. Requiring security awareness training for vendor staff
D. Performing integration testing with vendor systems
Answer: A
Explanation:
The best way to support the incident management process for attacks on an organization’s supply
chain is to establish communication paths with vendors. This means that the organization and its
vendors have clear and agreed-upon channels, methods, and protocols for exchanging information
and coordinating actions in the event of an incident that affects the supply chain.
Which of the following BEST ensures information security governance is aligned with corporate
governance?
A. A security steering committee including IT representation
B. A consistent risk management approach
C. An information security risk register
D. Integration of security reporting into corporate reporting
Answer: D
Explanation:
The best way to ensure information security governance is aligned with corporate governance is to
integrate security reporting into corporate reporting. This will enable the board and senior
management to oversee and monitor the performance and effectiveness of the information security
program, as well as the alignment of information security objectives and strategies with business
goals and risk appetite. Security reporting should provide relevant, timely, accurate, and actionable
information to support decision making and accountability.
Which of the following should an information security manager do FIRST upon learning that some
security hardening settings may negatively impact future business activity?
A. Perform a risk assessment.
B. Reduce security hardening settings.
C. Inform business management of the risk.
D. Document a security exception.
Answer: A
Explanation:
Security hardening is the process of applying security configuration settings to systems and software
to reduce their attack surface and improve their resistance to threats1. Security hardening settings
are based on industry standards and best practices, such as the CIS Benchmarks2, which provide
recommended security configurations for various software applications, operating systems, and
network devices. However, security hardening settings may not always be compatible with the
business requirements and objectives of an organization, and may negatively impact the
functionality, performance, or usability of the systems and software3. Therefore, before applying any
security hardening settings, an information security manager should perform a risk assessment to
evaluate the potential benefits and drawbacks of the settings, and to identify and prioritize the risks
associated with them. A risk assessment is a systematic process of identifying, analyzing, and
evaluating the risks that an organization faces, and determining the appropriate risk responses. A risk
assessment helps the information security manager to balance the security and business needs of the organization, and to communicate the risk level and impact to the relevant stakeholders. A risk
assessment should be performed first, before taking any other actions, such as reducing security
hardening settings, informing business management of the risk, or documenting a security exception, because it provides the necessary information and justification for making informed and rational decisions.
Which of the following is the MOST important reason to ensure information security is aligned with
the organization’s strategy?
A. To identify the organization’s risk tolerance
B. To improve security processes
C. To align security roles and responsibilities
D. To optimize security risk management
Answer: D
Explanation:
= The most important reason to ensure information security is aligned with the organization’s
strategy is to optimize security risk management. Information security is not an isolated function, but
rather an integral part of the organization’s overall objectives, processes, and governance. By
aligning information security with the organization’s strategy, the information security manager can
ensure that security risks are identified, assessed, treated, and monitored in a consistent, effective,
and efficient manner1. Alignment also enables the information security manager to communicate
the value and benefits of information security to senior management and other stakeholders, and to justify the allocation of resources and investments for security initiatives. Alignment also helps to establish clear roles and responsibilities for information security across the organization, and to
foster a culture of security awareness and accountability. Therefore, alignment is essential for optimizing security risk management, which is the process of balancing the protection of information assets with the business objectives and risk appetite of the organization.
Which of the following should be the MOST important consideration when establishing information
security policies for an organization?
A. Job descriptions include requirements to read security policies.
B. The policies are updated annually.
C. Senior management supports the policies.
D. The policies are aligned to industry best practices.
Answer: C
Explanation:
The most important consideration when establishing information security policies for an organization
is to ensure that senior management supports the policies. Senior management support is essential
for the successful implementation and enforcement of information security policies, as it
demonstrates the commitment and accountability of the organization’s leadership to information
security. Senior management support also helps to allocate adequate resources, establish clear roles
and responsibilities, and promote a security-aware culture within the organization. Without senior
management support, information security policies may not be aligned with the organization’s goals
and objectives, may not be communicated and disseminated effectively, and may not be followed or
enforced consistently.
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
A. Threat management is enhanced.
B. Compliance status is improved.
C. Security metrics are enhanced.
D. Proactive risk management is facilitated.
Answer: D
Explanation:
A vulnerability assessment process is a systematic and proactive approach to identify, analyze and
prioritize the vulnerabilities in an information system. It helps to reduce the exposure of the system
to potential threats and improve the security posture of the organization. By implementing a
vulnerability assessment process, the organization can facilitate proactive risk management, which is
the PRIMARY benefit of this process. Proactive risk management is the process of identifying,
assessing and mitigating risks before they become incidents or cause significant impact to the
organization. Proactive risk management enables the organization to align its security strategy with
it’s business objectives, optimize its security resources and investments and enhance its resilience
and compliance.
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
A. Threat management is enhanced.
B. Compliance status is improved.
C. Security metrics are enhanced.
D. Proactive risk management is facilitated.
Answer: D
Explanation:
The primary benefit of implementing a vulnerability assessment process is to facilitate proactive risk
management. A vulnerability assessment process is a systematic and periodic evaluation of the
security posture of an information system or network, which identifies and measures the
weaknesses and exposures that may be exploited by threats. By implementing a vulnerability
assessment process, the organization can proactively identify and prioritize the risks, and implement
appropriate controls and mitigation strategies to reduce the likelihood and impact of potential
incidents.
When properly implemented, secure transmission protocols protect transactions:
A. from eavesdropping.
B. from denial of service (DoS) attacks.
C. on the client desktop.
D. in the server’s database.
Answer: A
Explanation:
Secure transmission protocols are network protocols that ensure the integrity and security of data
transmitted across network connections. The specific network security protocol used depends on the
type of protected data and network connection. Each protocol defines the techniques and
procedures required to protect the network data from unauthorized or malicious attempts to read or
exfiltrate information1. One of the most common threats to network data is eavesdropping, which is
the interception and analysis of network traffic by an unauthorized third party. Eavesdropping can
compromise the confidentiality, integrity, and availability of network data, and can lead to data
breaches, identity theft, fraud, espionage, and sabotage.
Which of the following is MOST important to have in place as a basis for developing an effective
information security program that supports the organization’s business goals?
A. Metrics to drive the information security program
B. Information security policies
C. A defined security organizational structure
D. An information security strategy
Answer: D
Explanation:
An information security strategy is the most important element to have in place as a basis for
developing an effective information security program that supports the organization’s business
goals. An information security strategy is a high-level plan that defines the vision, mission,
objectives, scope, and principles of information security for the organization1. It also aligns the
information security program with the organization’s strategy, culture, risk appetite, and governance
framework2. An information security strategy provides the direction, guidance, and justification for
the information security program, and ensures that the program is consistent, coherent, and
comprehensive3. An information security strategy also helps to prioritize the information security
initiatives, allocate the resources and measure the performance and value of the information
security program4.
Which of the following is the MOST important consideration when establishing an organization’s
information security governance committee?
A. Members have knowledge of information security controls.
B. Members are business risk owners.
C. Members are rotated periodically.
D. Members represent functions across the organization.
Answer: D
Explanation:
= The most important consideration when establishing an organization’s information security
governance committee is to ensure that members represent functions across the organization. This is
because the information security governance committee is responsible for setting the direction,
scope, and objectives of the information security program, and for ensuring that the program aligns
with the organization’s business goals and strategies. By having members from different functions,
such as finance, human resources, operations, legal, and IT, the committee can ensure that the
information security program considers the needs, expectations, and perspectives of various
stakeholders, and that the program supports the organization’s mission, vision, and values. Having a
diverse and representative committee also helps to foster a culture of security awareness and
accountability throughout the organization, and to promote collaboration and communication
among different functions.
An information security manager learns that a risk owner has approved exceptions to replace key
controls with weaker compensating controls to improve process efficiency. Which of the following
should be the GREATEST concern?
A. Risk levels may be elevated beyond acceptable limits.
B. Security audits may report more high-risk findings.
C. The compensating controls may not be cost efficient.
D. Noncompliance with industry best practices may result.
Answer: A
Explanation:
Replacing key controls with weaker compensating controls may introduce new vulnerabilities or
increase the likelihood or impact of existing threats, thus raising the risk levels beyond the
acceptable limits defined by the risk appetite and tolerance of the organization. This may expose the
organization to unacceptable losses or damages, such as financial, reputational, legal, or operational.
Therefore, the information security manager should be most concerned about the potential
elevation of risk levels and ensure that the risk owner is aware of the consequences and is accountable
for the decision.
Which of the following BEST indicates that information assets are classified accurately?
A. Appropriate prioritization of information risk treatment
B. Increased compliance with information security policy
C. Appropriate assignment of information asset owners
D. An accurate and complete information asset catalog
Answer: A
Explanation:
The best indicator that information assets are classified accurately is appropriate prioritization of
information risk treatment. Information asset classification is the process of assigning a level of
sensitivity or criticality to information assets based on their value, impact, and legal or regulatory
requirements. The purpose of information asset classification is to facilitate the identification and
protection of information assets according to their importance and risk exposure. Therefore, if
information assets are classified accurately, the organization can prioritize the information risk
treatment activities and allocate the resources accordingly.
Which of the following is MOST important to include in a post-incident review following a data
breach?
A. An evaluation of the effectiveness of the information security strategy
B. Evaluations of the adequacy of existing controls
C. Documentation of regulatory reporting requirements
D. A review of the forensics chain of custom
Answer: B
Explanation:
= A post-incident review is a process of analyzing and learning from a security incident, such as a data
breach, to improve the security posture and resilience of an organization. A post-incident review
should include the following elements12:
A clear and accurate description of the incident, including its scope, impact, timeline, root cause, and
contributing factors.
A detailed assessment of the effectiveness and efficiency of the incident response process, including
the roles and responsibilities, communication channels, coordination mechanisms, escalation
procedures, tools and resources, documentation, and reporting.
An evaluation of the adequacy of existing controls, such as policies, standards, procedures, technical
measures, awareness, and training, to prevent, detect, and mitigate similar incidents in the future.
A list of actionable recommendations and improvement plans, based on the lessons learned and best
practices, to address the identified gaps and weaknesses in the security strategy, governance, risk
management, and incident management.
A follow-up and monitoring mechanism to ensure the implementation and verification of the
recommendations and improvement plans.
The most important element to include in a post-incident review following a data breach is the
evaluation of the adequacy of existing controls, because it directly relates to the security objectives
and requirements of the organization, and provides the basis for enhancing the security posture and
resilience of the organization. Evaluating the existing controls helps to identify the vulnerabilities and
risks that led to the data breach, and to determine the appropriate corrective and preventive actions
to reduce the likelihood and impact of similar incidents in the future. Evaluating the existing controls
also helps to align the security strategy and governance with the business goals and objectives, and
to ensure the compliance with legal, regulatory, and contractual obligations.
Which of the following should be the PRIMARY area of focus when mitigating security risks
associated with emerging technologies?
A. Compatibility with legacy systems
B. Application of corporate hardening standards
C. Integration with existing access controls
D. Unknown vulnerabilities
Answer: D
Explanation:
= The primary area of focus when mitigating security risks associated with emerging technologies is
unknown vulnerabilities. Emerging technologies are new and complex, and often involve multiple
parties, interdependencies, and uncertainties. Therefore, they may have unknown vulnerabilities
that could expose the organization to threats that are difficult to predict, detect, or
prevent1. Unknown vulnerabilities could also result from the lack of experience, knowledge, or best
practices in implementing, operating, or securing emerging technologies2. Unknown vulnerabilities
could lead to serious consequences, such as data breaches, system failures, reputational damage,
legal liabilities, or regulatory sanctions3. Therefore, it is important to focus on identifying, assessing,
and addressing unknown vulnerabilities when mitigating security risks associated with emerging
technologies.
Which of the following would be the MOST effective way to present quarterly reports to the board on
the status of the information security program?
A. A capability and maturity assessment
B. Detailed analysis of security program KPIs
C. An information security dashboard
D. An information security risk register
Answer: C
Explanation:
An information security dashboard is the most effective way to present quarterly reports to the
board on the status of the information security program, because it provides a concise, visual, and
high-level overview of the key performance indicators (KPIs), metrics, and trends of the information
security program. An information security dashboard can help the board to quickly and easily
understand the current state, progress, and performance of the information security program, and to
identify any gaps, issues, or areas of improvement. An information security dashboard can also help
Questions and Answers PDF
16/464
the board to align the information security program with the organization’s business goals and
strategies, and to support the decision-making and oversight functions of the board.
Which of the following Is MOST useful to an information security manager when conducting a post-
incident review of an attack?
A. Cost of the attack to the organization
B. Location of the attacker
C. Method of operation used by the attacker
D. Details from intrusion detection system (IDS) logs
Answer: C
Explanation:
= The method of operation used by the attacker is the most useful information for an information security manager when conducting a post-incident review of an attack. This information can help
identify the root cause of the incident, the vulnerabilities exploited, the impact and severity of the
attack, and the effectiveness of the existing security controls. The method of operation can also
provide insights into the attacker’s motives, skills, and resources, which can help improve the
organization’s threat intelligence and risk assessment.
Which of the following is the MOST important criterion when deciding whether to accept residual
risk?
A. Cost of replacing the asset
B. Cost of additional mitigation
C. Annual loss expectancy (ALE)
D. Annual rate of occurrence
Answer: C
Explanation:
= Annual loss expectancy (ALE) is the most important criterion when deciding whether to accept
residual risk, because it represents the expected monetary loss for an asset due to a risk over a one-
year period. ALE is calculated by multiplying the annual rate of occurrence (ARO) of a risk event by
the single loss expectancy (SLE) of the asset. ARO is the estimated frequency of a risk event occurring
within a one-year period, and SLE is the estimated cost of a single occurrence of a risk event. ALE
helps to compare the cost and benefit of different risk responses, such as avoidance, mitigation,
transfer, or acceptance. Risk acceptance is appropriate when the ALE is lower than the cost of other
risk responses, or when the risk is unavoidable or acceptable within the organization’s risk appetite
and tolerance. ALE also helps to prioritize the risks that need more attention and resources.
An organization is planning to outsource the execution of its disaster recovery activities. Which of the
following would be MOST important to include in the outsourcing agreement?
A. Definition of when a disaster should be declared
B. Requirements for regularly testing backups
C. Recovery time objectives (RTOs)
D. The disaster recovery communication plan
Answer: C
Explanation:
The most important thing to include in the outsourcing agreement for disaster recovery activities is
the recovery time objectives (RTOs). RTOs are the maximum acceptable time frames within which
the critical business processes and information systems must be restored after a disaster or
disruption. RTOs are based on the business impact analysis (BIA) and the risk assessment, and they
reflect the business continuity requirements and expectations of the organization. By including the
RTOs in the outsourcing agreement, the organization can ensure that the service provider is aware of
and committed to meeting the agreed service levels and minimizing the downtime and losses in the
event of a disaster.
An organization plans to offer clients a new service that is subject to regulations. What should the
organization do FIRST when developing a security strategy in support of this new service?
A. Determine security controls for the new service.
B. Establish a compliance program,
C. Perform a gap analysis against the current state
D. Hire new resources to support the service.
Answer: C
Explanation:
A gap analysis is a process of comparing the current state of an organization’s security posture with the desired or required state, and identifying the gaps or discrepancies that need to be addressed. A gap analysis helps to determine the current level of compliance with relevant regulations, standards, and best practices, and to prioritize the actions and resources needed to achieve the desired level of compliance1. A gap analysis should be performed first when developing a security strategy in support of a new service that is subject to regulations, because it provides the following benefits2:
It helps to understand the scope and impact of the new service on the organization’s security objectives, risks, and controls.
It helps to identify the legal, regulatory, and contractual requirements that apply to the new service, and the potential penalties or consequences of non-compliance.
It helps to assess the effectiveness and efficiency of the existing security controls, and to identify the gaps or weaknesses that need to be remediated or enhanced.
It helps to align the security strategy with the business goals and objectives of the new service, and to ensure the security strategy is consistent and coherent across the organization.
It helps to communicate the security requirements and expectations to the stakeholders involved in the new service, and to obtain their support and commitment.