ISACA Certified Information Security Manager (CISM) Prep | 40 Questions with 100% Correct Answers | Verified
18 views 1 purchase
Course
ISACA
Institution
ISACA
Which of the following is the primary step in control implementation for a new business application? -
ANS - D. Risk assessment
When implementing an information security program, in which phase of the implementation should
metrics be established to assess the effectiveness of the program over ti...
isaca certified information security manager cism prep | 40 questions with 100 correct answers | verified
Written for
ISACA
All documents for this subject (34)
Seller
Follow
Eustace
Reviews received
Content preview
ISACA Certified Information Security
Manager (CISM) Prep
Which of the following is the primary step in control implementation for a new business application? -
ANS - D. Risk assessment
When implementing an information security program, in which phase of the implementation should
metrics be established to assess the effectiveness of the program over time?" - ANS - Either
B. Initiation
C. Design
Data owners are concerned and responsible for who has access to their resources and therefore need to
be concerned with the strategy of how to mitigate risk of data resource usage. Which of the following
actions facilitates that responsibility? - ANS - B. Entitlement changes
Which of the following is the best method to determine the effectiveness of the incident response
process? - ANS - C. Post-incident review
When properly implemented, a risk management program should be designed to reduce an
organization's risk to: - ANS - C. A level at which the organization is willing to accept
What controls the process of introducing changes to systems to ensure that unintended changes are not
introduced? - ANS - C. Change management
All actions dealing with incidents must be worked with cyclical consideration. What is the primary post-
incident review takeaway? - ANS - Either
A. Pursuit of legal action
B. Identify personnel failures
D. Derive ways to improve the response process
, If a forensics copy of a hard drive is required for legal matters, which of the following options provide
the best solid defense for preservation of evidence? - ANS - C. A bit-by-bit copy of all data
What is the preferred step an ISM should take to ensure the disaster recovery plan is adequate and
remains current? - ANS - A. Quarterly reviews of recovery plan information
Which of the following would prove to be the best protection and recovery procedures if an intruder has
gained root access to a system? - ANS - Either
A. Use system recovery to restore the last known good image
C. Rebuild the system and its OS and applications using the original vendor media
D. Have all users change passwords
As the increased use of regulation and compliance in the Information Security arena expands,
information security managers must work to put tasks into perspective. To do this, ISMs should involve
affected organizations and view "regulations" as a? - ANS - Either
A. Risk
B. Legal interpretation
Which of the following is the most significant challenge when developing an incident management
plan? - ANS - D. Lack of management and leadership buy-in
Resource allocation is crucial during incident triage as it assists in prioritization and categorization. Why
would this be critical for most organizations when conducting triage? - ANS - A. Most organizations
have limited incident handling resources
As part of the Risk Management process, assessments must be performed on the information systems
and resources of an organization. If there are vulnerabilities disclosed during an assessment, those
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Eustace. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $6.49. You're not tied to anything after your purchase.