ISACA CISM Exam Practice Questions (P. 1)
- Full Access (1250 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
An information security risk analysis BEST assists an organization in ensuring that:
- Athe infrastructure has the appropriate level of access control.
- Bcost-effective decisions are made with regard to which assets need protectionMost Voted
- Can appropriate level of funding is applied to security processes.
- Dthe organization implements appropriate security technologies
Correct Answer:
B
B

Indeed, the essence of an information security risk analysis lies in its ability to help an organization make judicious choices about where to channel its resources for maximum protection. It does this by identifying which assets are most vulnerable and which threats possess the greatest risk, thereby allowing for strategic, cost-effective decisions concerning asset protection.
send
light_mode
delete
Question #2
In a multinational organization, local security regulations should be implemented over global security policy because:
- Abusiness objectives are defined by local business unit managers.
- Bdeploying awareness of local regulations is more practical than of global policy.
- Cglobal security policies include unnecessary controls for local businesses.
- Drequirements of local regulations take precedence.Most Voted
Correct Answer:
D
D

Local security regulations in a multinational organization are prioritized over global security policy primarily to comply with the specific legal requirements of each country in which the company operates. Adherence to these local requirements helps mitigate potential legal and regulatory conflicts that could arise from a unilateral application of global policies. This approach ensures that the organization's security practices are aligned with local laws, which is crucial for maintaining regulatory compliance across different jurisdictions. Hence, the necessity to prioritize local regulations is imperative for the legal soundness and operational harmony of the company.
send
light_mode
delete
Question #3
To gain a clear understanding of the impact that a new regulatory requirement will have on an organization's information security controls, an information security manager should FIRST:
- Aconduct a cost-benefit analysis.
- Bconduct a risk assessment.
- Cinterview senior management.
- Dperform a gap analysis.Most Voted
Correct Answer:
D
D

To effectively understand the impact of new regulatory requirements on current security measures, a gap analysis is indeed the first step to take. This approach precisely identifies the discrepancies between the existing security controls and the requirements introduced by the new regulation. By pinpointing these gaps, the organization can clearly assess the specific changes needed to achieve compliance and strategically plan their implementation. This method provides a practical and direct assessment of the immediate adjustments required to align with new regulatory standards.
send
light_mode
delete
Question #4
When management changes the enterprise business strategy, which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
- AAccess control management
- BChange management
- CConfiguration management
- DRisk managementMost Voted
Correct Answer:
D
D

When an organization's business strategy changes, it's crucial to reassess and possibly redefine information security controls to address new or modified risks. Risk management is the key process that supports this by systematically evaluating existing controls and guiding the selection of appropriate new ones to ensure alignment with the updated business context. It serves as a comprehensive approach to understanding and mitigating risks in light of strategic shifts, making it distinctly suitable for the task compared to other processes like access, change, or configuration management.
send
light_mode
delete
Question #5
Which of the following is the BEST way to build a risk-aware culture?
- APeriodically change risk awareness messages.
- BEnsure that threats are communicated organization-wide in a timely manner.
- CPeriodically test compliance with security controls and post results.
- DEstablish incentives and a channel for staff to report risks.Most Voted
Correct Answer:
C
C

Creating a risk-aware culture is crucial, and the most effective method is to periodically test compliance with security controls and then publicly share the results. This approach encourages transparency and accountability. When employees are consistently aware that their adherence to security policies is being monitored and results are visible, they are more likely to take their responsibilities seriously. They understand the tangible consequences of non-compliance, which fosters a proactive stance on following security protocols and participating in security awareness activities.
send
light_mode
delete
Question #6
What would be an information security manager's BEST recommendation upon learning that an existing contract with a third party does not clearly identify requirements for safeguarding the organization's critical data?
- ACancel the outsourcing contract.
- BTransfer the risk to the provider.
- CCreate an addendum to the existing contract.Most Voted
- DInitiate an external audit of the provider's data center.
Correct Answer:
C
C

Creating an addendum to the current contract is the most practical step when the original agreement lacks details on protecting critical data. This approach facilitates the inclusion of specific, targeted terms for data security while preserving the existing business relationship. Such an amendment ensures both clarity and sufficiency in addressing security concerns without the need to terminate or fundamentally alter the original contract. This method keeps the contractual relations smooth and focused directly on the enhancement of necessary security measures.
send
light_mode
delete
Question #7
An organization has purchased a security information and event management (SIEM) tool. Which of the following is MOST important to consider before implementation?
- AControls to be monitoredMost Voted
- BReporting capabilities
- CThe contract with the SIEM vendor
- DAvailable technical support
Correct Answer:
A
A

The primary factor to consider before implementing a SIEM tool is determining which controls to monitor. This choice is foundational, as it dictates the entire configuration and effectiveness of the SIEM solution. Clear identification of these controls ensures that the tool aligns with your security needs and complies with relevant regulations. By focusing on these controls first, other aspects, such as reporting capabilities and technical support, can be more effectively tailored to support these primary monitoring objectives. This initial focus helps in setting up a SIEM system that accurately reflects and defends the organization's security posture.
send
light_mode
delete
Question #8
Which of the following is MOST likely to be included in an enterprise security policy?
- ADefinitions of responsibilitiesMost Voted
- BRetention schedules
- CSystem access specifications
- DOrganizational risk
Correct Answer:
A
A

Absolutely spot on with choice A regarding definitions of responsibilities. A robust enterprise security policy fundamentally outlines various roles and what they are responsible for in the organization's security framework. This not only fosters clarity but also ensures that all security-related duties are assigned and acknowledged, efficiently linking personnel to specific security actions and expectations. This foundational element is critical as it directly influences compliance, governance, and operational effectiveness in protecting organizational assets.
send
light_mode
delete
Question #9
Which of the following should an information security manager do FIRST when a legacy application is not compliant with a regulatory requirement, but the business unit does not have the budget for remediation?
- ADevelop a business case for funding remediation efforts.
- BAdvise senior management to accept the risk of noncompliance.
- CNotify legal and internal audit of the noncompliant legacy application.
- DAssess the consequences of noncompliance against the cost of remediation.Most Voted
Correct Answer:
D
D

When handling a non-compliant legacy application when there’s no budget for remediation, the first step for an information security manager should be to assess the consequences of noncompliance against the cost of remediation. This involves understanding both the financial impact and the potential security risks. Such an assessment provides crucial information necessary for making informed decisions about risk acceptance, funding remediation, or exploring alternative strategies. This step is essential as it shapes the discussions and decisions taken at higher management levels regarding compliance strategies and budget allocation.
send
light_mode
delete
Question #10
Which of the following is the MOST effective way to address an organization's security concerns during contract negotiations with a third party?
- AReview the third-party contract with the organization's legal department.
- BCommunicate security policy with the third-party vendor.
- CEnsure security is involved in the procurement process.Most Voted
- DConduct an information security audit on the third-party vendor.
Correct Answer:
B
B

Communicating your security policies to third-party vendors during contract negotiations ensures transparency and aligns expectations. This approach proactively addresses potential security concerns by making sure that the third party understands your security requirements from the start. Establishing these expectations early in the contract process not only prevents future conflicts but also enhances collaborative efforts to adhere to security standards, crucial for safeguarding sensitive information. This strategy ensures security considerations are integrated into the operational relationship from the outset, promoting a secure and compliant partnership.
send
light_mode
delete
All Pages