Top Tips Of CISM preparation

Ucertifys Isaca CISM test serp provides our customers with all the real knowledge of using the actual exam. Several candidates have passed the Isaca CISM exam with all the help associated with our Isaca examination materials. We all provide full refund if you dont pass your exam. And you just need to supply your transcript along with related forms. Our workers may remit your paying fees to you soon. The ideal and outstanding quality along with value with regard to our Isaca exam assure you get your Isaca Isaca certification.

2016 Dec CISM practice exam

Q21. Information security projects should be prioritized on the basis of: 

A. time required for implementation. 

B. impact on the organization. 

C. total cost for implementation. 

D. mix of resources required. 

Answer: B Explanation: 

Information security projects should be assessed on the basis of the positive impact that they will have on the organization. Time, cost and resource issues should be subordinate to this objective. 


Q22. Which of the following is the MOST usable deliverable of an information security risk analysis? 

A. Business impact analysis (BIA) report 

B. List of action items to mitigate risk 

C. Assignment of risks to process owners 

D. Quantification of organizational risk 

Answer:

Explanation: 

Although all of these are important, the list of action items is used to reduce or transfer the current level of risk. The other options materially contribute to the way the actions are implemented. 


Q23. A mission-critical system has been identified as having an administrative system account with attributes that prevent locking and change of privileges and name. Which would be the BEST approach to prevent successful brute forcing of the account? 

A. Prevent the system from being accessed remotely 

B. Create a strong random password 

C. Ask for a vendor patch 

D. Track usage of the account by audit trails 

Answer:

Explanation: 

Creating a strong random password reduces the risk of a successful brute force attack by exponentially increasing the time required. Preventing the system from being accessed remotely is not always an option in mission-critical systems and still leaves local access risks. Vendor patches are not always available, tracking usage is a detective control and will not prevent an attack. 


Q24. Who is ultimately responsible for the organization's information? 

A. Data custodian 

B. Chief information security officer (CISO) 

C. Board of directors 

D. Chief information officer (CIO) 

Answer:

Explanation: 

The board of directors is ultimately responsible for the organization's information and is tasked with responding to issues that affect its protection. The data custodian is responsible for the maintenance and protection of data. This role is usually filled by the IT department. The chief information security officer (CISO) is responsible for security and carrying out senior management's directives. The chief information officer (CIO) is responsible for information technology within the organization and is not ultimately responsible for the organization's information. 


Q25. Which of the following is characteristic of decentralized information security management across a geographically dispersed organization? 

A. More uniformity in quality of service 

B. Better adherence to policies 

C. Better alignment to business unit needs 

D. More savings in total operating costs 

Answer:

Explanation: 

Decentralization of information security management generally results in better alignment to business unit needs. It is generally more expensive to administer due to the lack of economies of scale. Uniformity in quality of service tends to vary from unit to unit. 


Regenerate CISM pdf exam:

Q26. Which of the following will BEST prevent external security attacks? 

A. Static IP addressing 

B. Network address translation 

C. Background checks for temporary employees 

D. Securing and analyzing system access logs 

Answer:

Explanation: 

Network address translation is helpful by having internal addresses that are nonroutable. Background checks of temporary employees are more likely to prevent an attack launched from within the enterprise. Static IP addressing does little to prevent an attack. Writing all computer logs to removable media does not help in preventing an attack. 


Q27. To determine the selection of controls required to meet business objectives, an information 

security manager should: 

A. prioritize the use of role-based access controls. 

B. focus on key controls. 

C. restrict controls to only critical applications. 

D. focus on automated controls. 

Answer:

Explanation: 

Key controls primarily reduce risk and are most effective for the protection of information assets. The other choices could be examples of possible key controls. 


Q28. The MOST important function of a risk management program is to: 

A. quantify overall risk. 

B. minimize residual risk. 

C. eliminate inherent risk. 

D. maximize the sum of all annualized loss expectancies (ALEs). 

Answer:

Explanation: 

A risk management program should minimize the amount of risk that cannot be otherwise eliminated or transferred; this is the residual risk to the organization. Quantifying overall risk is important but not as critical as the end result. Eliminating inherent risk is virtually impossible. Maximizing the sum of all ALEs is actually the opposite of what is desirable. 


Q29. The MOST important factor in planning for the long-term retention of electronically stored business records is to take into account potential changes in: 

A. storage capacity and shelf life. 

B. regulatory and legal requirements. 

C. business strategy and direction. 

D. application systems and media. 

Answer:

Explanation: 

Long-term retention of business records may be severely impacted by changes in application systems and media. For example, data stored in nonstandard formats that can only be read and interpreted by previously decommissioned applications may be difficult, if not impossible, to recover. Business strategy and direction do not generally apply, nor do legal and regulatory requirements. Storage capacity and shelf life are important but secondary issues. 


Q30. Who should be responsible for enforcing access rights to application data? 

A. Data owners 

B. Business process owners 

C. The security steering committee 

D. Security administrators 

Answer:

Explanation: 

As custodians, security administrators are responsible for enforcing access rights to data. Data owners are responsible for approving these access rights. Business process owners are sometimes the data owners as well, and would not be responsible for enforcement. The security steering committee would not be responsible for enforcement. 



see more CISM dumps