Last Updated on October 26, 2022 by InfraExam
CISM : Certified Information Security Manager : Part 40
-
An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?
- Requiring the backup of the organization’s data by the user
- Establishing the authority to remote wipe
- Monitoring how often the smartphone is used
- Developing security awareness training
-
During which phase of an incident response process should corrective actions to the response procedure be considered and implemented?
- Eradication
- Review
- Containment
- Identification
-
Employees in a large multinational organization frequently travel among various geographic locations. Which type of authorization policy BEST addresses this practice?
- Multilevel
- Identity
- Role-based
- Discretionary
-
To ensure IT equipment meets organizational security standards, the MOST efficient approach is to:
- assess security during equipment deployment.
- ensure compliance during user acceptance testing (UAT).
- assess the risks of all new equipment.
- develop an approved equipment list.
-
Segregation of duties is a security control PRIMARILY used to:
- establish dual check.
- establish hierarchy.
- limit malicious behavior.
- decentralize operations.
-
Which of the following is the BEST approach when using sensitive customer data during the testing phase of a systems development project?
- Establish the test environment on a separate network.
- Sanitize customer data.
- Monitor the test environment for data loss.
- Implement equivalent controls to those on the source system.
-
Which of the following analyses will BEST identify the external influences to an organization’s information security?
- Gap analysis
- Business impact analysis
- Threat analysis
- Vulnerability analysis.
-
Spoofing should be prevented because it may be used to:
- assemble information, track traffic, and identify network vulnerabilities.
- predict which way a program will branch when an option is presented.
- gain illegal entry to a secure system by faking the sender’s address.
- capture information such as password traveling through the network.
-
Utilizing external resources for highly technical information security tasks allows an information security manager to:
- distribute technology risk.
- leverage limited resources.
- outsource responsibility.
- transfer business risk.
-
The PRIMARY reason for using information security metrics is to:
- achieve senior management commitment.
- ensure alignment with corporate requirements.
- adhere to legal and regulatory requirements.
- monitor the effectiveness of controls.
-
An information security team is investigating an alleged breach of an organization’s network. Which of the following would be the BEST single source of evidence to review?
- Intrusion detection system (IDS)
- Security information and event management (SIEM) tool
- Antivirus software
- File integrity monitoring (FIM) software
-
Which of the following is the BEST defense against distributed denial of service (DDoS) attacks?
- Multiple and redundant paths
- Well-configured routers and firewalls
- Regular patching
- Intruder-detection lockout
-
Which of the following functions is the MOST critical when initiating the removal of system access for terminated employees?
- Human resources
- Legal
- Help desk
- Information security
-
After logging in to a web application, further password credentials are required at various application points. Which of the following is the PRIMARY reason for such an approach?
- To ensure access is granted to the authorized person
- To enforce strong two-factor authentication
- To ensure session management variables are secure
- To implement single sign-on
-
The MAIN reason for continuous monitoring of a security strategy is to:
- optimize resource allocation.
- confirm benefits are being realized.
- evaluate the implementation of the strategy.
- allocate funds for information security
-
Which of the following is the MOST important factor in an organization’s selection of a key risk indicator (KRI)?
- Return on investment
- Organizational culture
- Compliance requirements
- Criticality of information
-
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
- baseline security controls.
- cost-benefit analyses.
- benchmarking security metrics.
- security objectives.
-
In an organization that has undergone an expansion through an acquisition which of the following would BEST secure the enterprise network?
- Using security groups
- Log analysis of system access
- Business or role-based segmentation
- Encryption of data traversing networks
-
An organization has established information security policies, but the information security manager has noted a large number of exception requests. Which of the following is the MOST likely reason for this situation?
- The organization is operating in a highly regulated industry.
- The information security program is not adequately funded.
- The information security policies lack alignment with corporate goals.
- The information security policies are not communicated across the organization
-
An organization shares customer information across its globally dispersed branches. Which of the following should be the GREATEST concern to information security management?
- Cross-cultural differences between branches
- Conflicting data protection regulations
- Insecure wide area networks (WANs)
- Decentralization of information security