CISM Certified Information Security Manager – Question1139

An organization's information security manager has been asked to hire a consultant to help assess the maturity level of the organization's information security management. The MOST important element of the request for proposal (RIP) is the:

A.
references from other organizations.
B. past experience of the engagement team.
C. sample deliverable.
D. methodology used in the assessment.

Correct Answer: D

Explanation:

Explanation:
Methodology illustrates the process and formulates the basis to align expectations and the execution of the assessment. This also provides a picture of what is required of all parties involved in the assessment. References from other organizations are important, but not as important as the methodology used in the assessment. Past experience of the engagement team is not as important as the methodology used. Sample deliverables only tell how the assessment is presented, not the process.

CISM Certified Information Security Manager – Question1138

Requiring all employees and contractors to meet personnel security/suitability requirements commensurate with their position sensitivity level and subject to personnel screening is an example of a security:

A.
policy.
B. strategy.
C. guideline
D. baseline.

Correct Answer: A

Explanation:

Explanation:
A security policy is a general statement to define management objectives with respect to security. The security strategy addresses higher level issues. Guidelines are optional actions and operational tasks. A security baseline is a set of minimum requirements that is acceptable to an organization.

CISM Certified Information Security Manager – Question1137

An information security manager wishing to establish security baselines would:

A.
include appropriate measurements in the system development life cycle.
B. implement the security baselines to establish information security best practices.
C. implement the security baselines to fulfill laws and applicable regulations in different jurisdictions.
D. leverage information security as a competitive advantage.

Correct Answer: B

Explanation:

Explanation:
While including appropriate measurements in the system development life cycle may indicate a security baseline practice; these are wider in scope and, thus, implementing security baselines to establish information security best practices is the appropriate answer. Implementing security baselines to fulfill laws and applicable regulations in different jurisdictions, and leveraging information security as a competitive advantage may be supplementary benefits of using security baselines.

CISM Certified Information Security Manager – Question1136

What is the BEST way to alleviate security team understaffing while retaining the capability in-house?

A.
Hire a contractor that would not be included in the permanent headcount
B. Outsource with a security services provider while retaining the control internally
C. Establish a virtual security team from competent employees across the company
D. Provide cross training to minimize the existing resources gap

Correct Answer: C

Explanation:

Explanation:
While hiring an indirect resource that will not be part of headcount will help to add an extra resource, it usually costs more than a direct employee; thus, it is not cost efficient. Outsourcing may be a more expensive option and can add complexities to the service delivery. Competent security staff can be recruited from other departments e.g., IT. product development, research and development (R&D). By leveraging existing resources, there is a nominal additional cost. It is also a strategic option since the staff may join the team as full members in the future (internal transfer). Development of staff is often a budget drain and, if not managed carefully, these resources may move away from the company and leave the team with a bigger resource gap.

CISM Certified Information Security Manager – Question1135

Which of the following is the BEST indicator that an effective security control is built into an organization?

A.
The monthly service level statistics indicate a minimal impact from security issues.
B. The cost of implementing a security control is less than the value of the assets.
C. The percentage of systems that is compliant with security standards.
D. The audit reports do not reflect any significant findings on security.

Correct Answer: A

Explanation:

Explanation: The best indicator of effective security control is the evidence of little disruption to business operations. Choices B, C and D can support this evidence, but are supplemental to choice A.

CISM Certified Information Security Manager – Question1134

Which would be the BEST recommendation to protect against phishing attacks?

A.
Install an antispam system
B. Publish security guidance for customers
C. Provide security awareness to the organization's staff
D. Install an application-level firewall

Correct Answer: B

Explanation:

Explanation: Customers of the organization are the target of phishing attacks. Installing security software or training the organization’s staff will be useless. The effort should be put on the customer side.

CISM Certified Information Security Manager – Question1133

An account with full administrative privileges over a production file is found to be accessible by a member of the software development team. This account was set up to allow the developer to download nonsensitive production data for software testing purposes. The information security manager should recommend which of the following?

A.
Restrict account access to read only
B. Log all usage of this account
C. Suspend the account and activate only when needed
D. Require that a change request be submitted for each download

Correct Answer: A

Explanation:

Explanation:
Administrative accounts have permission to change data. This is not required for the developers to perform their tasks. Unauthorized change will damage the integrity of the data. Logging all usage of the account, suspending the account and activating only when needed, and requiring that a change request be submitted for each download will not reduce the exposure created by this excessive level of access. Restricting the account to read only access will ensure that the integrity can be maintained while permitting access.

CISM Certified Information Security Manager – Question1132

The "separation of duties" principle is violated if which of the following individuals has update rights to the database access control list (ACL)?

A.
Data owner
B. Data custodian
C. Systems programmer
D. Security administrator

Correct Answer: C

Explanation:

Explanation:
A systems programmer should not have privileges to modify the access control list (ACL) because this would give the programmer unlimited control over the system. The data owner would request and approve updates to the ACL, but it is not a violation of the separation of duties principle if the data owner has update rights to the ACL. The data custodian and the security administrator could carry out the updates on the ACL since it is part of their duties as delegated to them by the data owner.

CISM Certified Information Security Manager – Question1131

Which of the following is the BEST approach for an organization desiring to protect its intellectual property?

A.
Conduct awareness sessions on intellectual property policy
B. Require all employees to sign a nondisclosure agreement
C. Promptly remove all access when an employee leaves the organization
D. Restrict access to a need-to-know basis

Correct Answer: D

Explanation:

Explanation:
Security awareness regarding intellectual property policy will not prevent violations of this policy. Requiring all employees to sign a nondisclosure agreement and promptly removing all access when an employee leaves the organization are good controls, but not as effective as restricting access to a need-to- know basis.

CISM Certified Information Security Manager – Question1130

The MOST important reason for formally documenting security procedures is to ensure:

A.
processes are repeatable and sustainable.
B. alignment with business objectives.
C. auditability by regulatory agencies.
D. objective criteria for the application of metrics.

Correct Answer: A

Explanation:

Explanation:
Without formal documentation, it would be difficult to ensure that security processes are performed in the proper manner every time that they are performed. Alignment with business objectives is not a function of formally documenting security procedures. Processes should not be formally documented merely to satisfy an audit requirement. Although potentially useful in the development of metrics, creating formal documentation to assist in the creation of metrics is a secondary objective.