CISM Certified Information Security Manager – Question1129

What is the BEST way to ensure data protection upon termination of employment?

A.
Retrieve identification badge and card keys
B. Retrieve all personal computer equipment
C. Erase all of the employee's folders
D. Ensure all logical access is removed

Correct Answer: D

Explanation:

Explanation:
Ensuring all logical access is removed will guarantee that the former employee will not be able to access company data and that the employee’s credentials will not be misused. Retrieving identification badge and card keys would only reduce the capability to enter the building. Retrieving the personal computer equipment and the employee’s folders are necessary tasks, but that should be done as a second step.

CISM Certified Information Security Manager – Question1128

What is the GREATEST advantage of documented guidelines and operating procedures from a security perspective?

A.
Provide detailed instructions on how to carry out different types of tasks
B. Ensure consistency of activities to provide a more stable environment
C. Ensure compliance to security standards and regulatory requirements
D. Ensure reusability to meet compliance to quality requirements

Correct Answer: B

Explanation:

Explanation:
Developing procedures and guidelines to ensure that business processes address information security risk is critical to the management of an information security program. Developing procedures and guidelines establishes a baseline for security program performance and consistency of security activities.

CISM Certified Information Security Manager – Question1127

Which of the following would be the MOST appropriate physical security solution for the main entrance to a data center"?

A.
Mantrap
B. Biometric lock
C. Closed-circuit television (CCTV)
D. Security guard

Correct Answer: B

Explanation:

Explanation:
A biometric device will ensure that only the authorized user can access the data center. A mantrap, by itself, would not be effective. Closed-circuit television (CCTV) and a security guard provide a detective control, but would not be as effective in authenticating the access rights of each individual.

CISM Certified Information Security Manager – Question1126

What is the GREATEST risk when there is an excessive number of firewall rules?

A.
One rule may override another rule in the chain and create a loophole
B. Performance degradation of the whole network
C. The firewall may not support the increasing number of rules due to limitations
D. The firewall may show abnormal behavior and may crash or automatically shut down

Correct Answer: A

Explanation:

Explanation:
If there are many firewall rules, there is a chance that a particular rule may allow an external connection although other associated rules are overridden. Due to the increasing number of rules, it becomes complex to test them and. over time, a loophole may occur.

CISM Certified Information Security Manager – Question1125

Before engaging outsourced providers, an information security manager should ensure that the organization's data classification requirements:

A.
are compatible with the provider's own classification.
B. are communicated to the provider.
C. exceed those of the outsourcer.
D. are stated in the contract.

Correct Answer: D

Explanation:

Explanation: The most effective mechanism to ensure that the organization’s security standards are met by a third party, would be a legal agreement. Choices A. B and C are acceptable options, but not as comprehensive or as binding as a legal contract.

CISM Certified Information Security Manager – Question1124

To mitigate a situation where one of the programmers of an application requires access to production data, the information security manager could BEST recommend to.

A.
create a separate account for the programmer as a power user.
B. log all of the programmers' activity for review by supervisor.
C. have the programmer sign a letter accepting full responsibility.
D. perform regular audits of the application.

Correct Answer: B

Explanation:

Explanation:
It is not always possible to provide adequate segregation of duties between programming and operations in order to meet certain business requirements. A mitigating control is to record all of the programmers’ actions for later review by their supervisor, which would reduce the likelihood of any inappropriate action on the part of the programmer. Choices A, C and D do not solve the problem.

CISM Certified Information Security Manager – Question1123

To reduce the possibility of service interruptions, an entity enters into contracts with multiple Internet service providers (ISPs). Which of the following would be the MOST important item to include?

A.
Service level agreements (SLAs)
B. Right to audit clause
C. Intrusion detection system (IDS) services
D. Spam filtering services

Correct Answer: A

Explanation:

Explanation:
Service level agreements (SLA) will be most effective in ensuring that Internet service providers (ISPs) comply with expectations for service availability. Intrusion detection system (IDS) and spam filtering services would not mitigate (as directly) the potential for service interruptions. A right-to-audit clause would not be effective in mitigating the likelihood of a service interruption.

CISM Certified Information Security Manager – Question1122

When a new key business application goes into production, the PRIMARY reason to update relevant business impact analysis (BIA) and business continuity/disaster recovery plans is because:

A.
this is a requirement of the security policy.
B. software licenses may expire in the future without warning.
C. the asset inventory must be maintained.
D. service level agreements may not otherwise be met.

Correct Answer: D

Explanation:

Explanation: The key requirement is to preserve availability of business operations. Choice A is a correct compliance requirement, but is not the main objective in this case. Choices B and C are supplementary requirements for business continuity/disaster recovery planning.

CISM Certified Information Security Manager – Question1121

Change management procedures to ensure that disaster recovery/business continuity plans are kept up-to-date can be BEST achieved through which of the following?

A.
Reconciliation of the annual systems inventory to the disaster recovery, business continuity plans
B. Periodic audits of the disaster recovery/business continuity plans
C. Comprehensive walk-through testing
D. Inclusion as a required step in the system life cycle process

Correct Answer: D

Explanation:

Explanation:
Information security should be an integral component of the development cycle; thus, it should be included at the process level. Choices A, B and C are good mechanisms to ensure compliance, but would not be nearly as timely in ensuring that the plans are always up-to-date. Choice D is a preventive control, while choices A, B and C are detective controls.

CISM Certified Information Security Manager – Question1120

Which of the following would be MOST critical to the successful implementation of a biometric authentication system?

A.
Budget allocation
B. Technical skills of staff
C. User acceptance
D. Password requirements

Correct Answer: C

Explanation:

Explanation:
End users may react differently to the implementation, and may have specific preferences. The information security manager should be aware that what is viewed as reasonable in one culture may not be acceptable in another culture. Budget allocation will have a lesser impact since what is rejected as a result of culture cannot be successfully implemented regardless of budgetary considerations. Technical skills of staff will have a lesser impact since new staff can be recruited or existing staff can be trained. Although important, password requirements would be less likely to guarantee the success of the implementation.