CISM Certified Information Security Manager – Question1119

Managing the life cycle of a digital certificate is a role of a(n):

A.
system administrator.
B. security administrator.
C. system developer.
D. independent trusted source.

Correct Answer: D

Explanation:

Explanation:
Digital certificates must be managed by an independent trusted source in order to maintain trust in their authenticity. The other options are not necessarily entrusted with this capability.

CISM Certified Information Security Manager – Question1118

Who is responsible for raising awareness of the need for adequate funding for risk action plans?

A.
Chief information officer (CIO)
B. Chief financial officer (CFO)
C. Information security manager
D. Business unit management

Correct Answer: C

Explanation:

Explanation:
The information security manager is responsible for raising awareness of the need for adequate funding for risk-related action plans. Even though the chief information officer (CIO), chief financial officer (CFO) and business unit management are involved in the final approval of fund expenditure, it is the information security manager who has the ultimate responsibility for raising awareness.

CISM Certified Information Security Manager – Question1117

Which of the following would BEST assist an information security manager in measuring the existing level of development of security processes against their desired state?

A.
Security audit reports
B. Balanced scorecard
C. Capability maturity model (CMM)
D. Systems and business security architecture

Correct Answer: C

Explanation:

Explanation:
The capability maturity model (CMM) grades each defined area of security processes on a scale of 0 to 5 based on their maturity, and is commonly used by entities to measure their existing state and then determine the desired one. Security audit reports offer a limited view of the current state of security. Balanced scorecard is a document that enables management to measure the implementation of their strategy and assists in its translation into action. Systems and business security architecture explain the security architecture of an entity in terms of business strategy, objectives, relationships, risks, constraints and enablers, and provides a business-driven and business-focused view of security architecture.

CISM Certified Information Security Manager – Question1116

Which of the following is the BEST tool to maintain the currency and coverage of an information security program within an organization?

A.
The program's governance oversight mechanisms
B. Information security periodicals and manuals
C. The program's security architecture and design
D. Training and certification of the information security team

Correct Answer: A

Explanation:

Explanation:
While choices B, C and D will all assist the currency and coverage of the program, its governance oversight mechanisms are the best method.

CISM Certified Information Security Manager – Question1115

Which of the following would be the MOST significant security risk in a pharmaceutical institution?

A.
Compromised customer information
B. Unavailability of online transactions
C. Theft of security tokens
D. Theft of a Research and Development laptop

Correct Answer: D

Explanation:

Explanation:
The research and development department is usually the most sensitive area of the pharmaceutical organization, Theft of a laptop from this area could result in the disclosure of sensitive formulas and other intellectual property which could represent the greatest security breach. A pharmaceutical organization does not normally have direct contact with end customers and their transactions are not time critical: therefore, compromised customer information and unavailability of online transactions are not the most significant security risks. Theft of security tokens would not be as significant since a pin would still be required for their use.

CISM Certified Information Security Manager – Question1114

Who should determine the appropriate classification of accounting ledger data located on a database server and maintained by a database administrator in the IT department?

A.
Database administrator (DBA)
B. Finance department management
C. Information security manager
D. IT department management

Correct Answer: B

Explanation:

Explanation:
Data owners are responsible for determining data classification; in this case, management of the finance department would be the owners of accounting ledger data. The database administrator (DBA) and IT management are the custodians of the data who would apply the appropriate security levels for the classification, while the security manager would act as an advisor and enforcer.

CISM Certified Information Security Manager – Question1113

An information security program should focus on:

A.
best practices also in place at peer companies.
B. solutions codified in international standards.
C. key controls identified in risk assessments.
D. continued process improvement.

Correct Answer: C

Explanation:

Explanation:
Risk assessment identifies the appropriate controls to mitigate identified business risks that the program should implement to protect the business. Peer industry best practices, international standards and continued process improvement can be used to support the program, but these cannot be blindly implemented without the consideration of business risk.

CISM Certified Information Security Manager – Question1112

Which of the following is the MOST effective, positive method to promote security awareness?

A.
Competitions and rewards for compliance
B. Lock-out after three incorrect password attempts
C. Strict enforcement of password formats
D. Disciplinary action for noncompliance

Correct Answer: A

Explanation:

Explanation:
Competitions and rewards are a positive encouragement to user participation in the security program. Merely locking users out for forgetting their passwords does not enhance user awareness. Enforcement of password formats and disciplinary actions do not positively promote awareness.

CISM Certified Information Security Manager – Question1111

The configuration management plan should PRIMARILY be based upon input from:

A.
business process owners.
B. the information security manager.
C. the security steering committee.
D. IT senior management.

Correct Answer: D

Explanation:

Explanation:
Although business process owners, an information security manager and the security steering committee may provide input regarding a configuration management plan, its final approval is the primary responsibility of IT senior management.

CISM Certified Information Security Manager – Question1110

Which of the following events generally has the highest information security impact?

A.
Opening a new office
B. Merging with another organization
C. Relocating the data center
D. Rewiring the network

Correct Answer: B

Explanation:

Explanation:
Merging with or acquiring another organization causes a major impact on an information security management function because new vulnerabilities and risks are inherited. Opening a new office, moving the data center to a new site, or rewiring a network may have information security risks, but generally comply with corporate security policy and are easier to secure.