(@CyberBankSa) End+of+Book+Review
(@CyberBankSa) End+of+Book+Review
(@CyberBankSa) End+of+Book+Review
Risk Appetite
Goals:
Management is Responsible
Testing Day:
Get up in plenty of time to get to testing center…If late for any reason, call!
Many questions are “MOST” or “BEST” which means multiple answers are true…which one
solves the problem best, most efficiently or is most closely aligned with isaca
Think alignment with business goals, risk management, cost/benefit analysis, measure
objectives
50 Question
Review
CISM 50 Question Review
1. Which of the following application systems should have the shortest recovery time objective (RTO)?
A. Contractor payroll
B. Change management
2. Which of the following would BEST ensure the success of information security governance within an
organization?
4. Which of the following BEST indicates the probability that a successful attack will occur?
A. external auditors.
B. stockholders.
C. senior management.
D. peer organizations.
6. The GREATEST reduction in overhead costs for security administration would be provided by:
A. Standards
B. Procedures
C. Policies
D. Guidelines
8. Which of the following will BEST protect against deletion of data files by a former employee?
A. Preemployment screening
B. Close monitoring of users
9. Which of the following is the MOST important element to ensure the success of a disaster recovery
test at a vendor-provided hot site?
10. Which of the following individuals would be in the BEST position to sponsor the creation of an
information security steering group?
A. data encryption.
B. digital signatures.
C. strong passwords.
D. two-factor authentication.
13. Which of the following is MOST appropriate for inclusion in an information security strategy?
C. Firewall rule sets, network defaults and intrusion detection system (IDS) settings
15. A business unit intends to deploy a new technology in a manner that places it in violation of existing
information security standards. What immediate action should the information security manager take?
16. Which of the following is the BEST method for ensuring that security procedures and guidelines are
read and understood?
17. Which of the following is the MOST effective in preventing attacks that exploit weaknesses in
operating systems?
A. Patch management
B. Change management
C. Security baselines
D. Acquisition management
18. Which of the following is the MOST important to ensure a successful recovery?
B. Procedures
C. Guidelines
D. Standards
20. The BEST way to determine if an anomaly-based intrusion detection system (IDS) is properly installed
is to:
21. Which of the following would be the MOST appropriate task for a chief information security officer
to perform?
22. The BEST way to ensure that security settings on each platform are in compliance with information
security policies and procedures is to:
23. Which of the following is the MOST important element in ensuring the success of a disaster recovery
test at a vendor provided hot site?
24. Which of the following would BEST prepare an information security manager for regulatory reviews?
25. The MOST important reason for conducting the same risk assessment more than once is because:
27. Which of the following is the BEST indicator that security awareness training has been effective?
A. Have employees sign to confirm they have read the security policy.
28. Which of the following should be mandatory for any disaster recovery test?
A. Only materials taken from offsite storage or those predeployed at the hot site are used.
C. Hot site personnel are not informed in advance when the test is to be held.
D. Key systems are restored to identical operating system (OS) releases and hardware
configurations.
29. Which of the following would normally be covered in an insurance policy for computer equipment
coverage? Equipment:
A. Telephone trees
B. Declaration criteria
31. Which of the following actions should be taken when an online trading company discovers a network
attack in progress?
32. Which of the following should management use to determine the amount of resources to devote to
mitigating exposures?
33. Which of the following will MOST likely reduce the likelihood of an unauthorized individual gaining
access to computing resources by pretending to be an authorized individual needing to have their
password reset?
34. Which of the following is MOST important when deciding whether to build an alternate facility or
subscribe to a hot site operated by a third party?
35. The MOST appropriate reporting base for the information security management function would be
to report to the:
A. head of IT.
B. infrastructure director.
C. network manager.
38. The BEST reason for an organization to have two discrete firewalls connected directly to the Internet
and to the same DMZ would be to:
39. When a large organization discovers that it is the subject of a network probe, which of the following
actions should be taken?
40. When a minor security flaw is found in a new system that is about to be moved into production, this
should be reported to:
41. Which of the following is MOST indicative of the failure of information security governance within an
organization?
B. The chief information officer (CIO) approves changes to the security policy.
D. The data center manager has final sign-off on all security projects.
42. The decision on whether new risks should fall under periodic or event-driven reporting should be
based on:
43. What is the BEST way to ensure that a corporate network is adequately secured against external
attack?
47. Which of the following are seldom changed in response to technological changes?
A. Standards
B. Procedures
C. Policies
D. Guidelines
48. The BEST way to integrate risk management into life cycle processes is through:
A. policy development.
B. change management.
C. awareness training.
D. regular monitoring.
49. Which of the following is the MOST effective solution for preventing internal users from modifying
sensitive and classified information?
2. A 27. B
3. C 28. A
4. C 29. A
5. C 30. B
6. B 31. C
7. C 32. A
8. D 33. B
9. D 34. C
10. B 35. D
11. C 36. A
12. D 37. C
13. B 38. C
14. B 39. C
15. C 40. A
16. C 41. D
17. A 42. B
18. A 43. D
19. C 44. B
20. A 45. A
21. D 46. B
22. B 47. C
23. D 48. B
24. B 49. C
25. B 50.D