CISM Certified Information Security Manager – Question1109

What is the MOST important success factor in launching a corporate information security awareness program?

A.
Adequate budgetary support
B. Centralized program management
C. Top-down approach
D. Experience of the awareness trainers

Correct Answer: C

Explanation:

Explanation:
Senior management support will provide enough resources and will focus attention to the program: training should start at the top levels to gain support and sponsorship. Funding is not a primary concern. Centralized management does not provide sufficient support. Trainer experience, while important, is not the primary success factor.

CISM Certified Information Security Manager – Question1108

What is the MOST important element to include when developing user security awareness material?

A.
Information regarding social engineering
B. Detailed security policies
C. Senior management endorsement
D. Easy-to-read and compelling information

Correct Answer: D

Explanation:

Explanation:
Making security awareness material easy and compelling to read is the most important success factor. Users must be able to understand, in easy terms, complex security concepts in a way that makes compliance more accessible. Choice A would also be important but it needs to be presented in an adequate format. Detailed security policies might not necessarily be included in the training materials. Senior management endorsement is important for the security program as a whole and not necessarily for the awareness training material.

CISM Certified Information Security Manager – Question1107

Which of the following should be in place before a black box penetration test begins?

A.
IT management approval
B. Proper communication and awareness training
C. A clearly stated definition of scope
D. An incident response plan

Correct Answer: C

Explanation:

Explanation:
Having a clearly stated definition of scope is most important to ensure a proper understanding of risk as well as success criteria, IT management approval may not be required based on senior management decisions. Communication, awareness and an incident response plan are not a necessary requirement. In fact, a penetration test could help promote the creation and execution of the incident response plan.

CISM Certified Information Security Manager – Question1106

A business partner of a factory has remote read-only access to material inventory to forecast future acquisition orders. An information security manager should PRIMARILY ensure that there is:

A.
an effective control over connectivity and continuity.
B. a service level agreement (SLA) including code escrow.
C. a business impact analysis (BIA).
D. a third-party certification.

Correct Answer: A

Explanation:

Explanation:
The principal risk focus is the connection procedures to maintain continuity in case of any contingency. Although an information security manager may be interested in the service level agreement (SLA), code escrow is not a concern. A business impact analysis (BIA) refers to contingency planning and not to system access. Third-party certification does not provide any assurance of controls over connectivity to maintain continuity.

CISM Certified Information Security Manager – Question1105

When security policies are strictly enforced, the initial impact is that:

A.
they may have to be modified more frequently.
B. they will be less subject to challenge.
C. the total cost of security is increased.
D. the need for compliance reviews is decreased.

Correct Answer: C

Explanation:

Explanation:
When security policies are strictly enforced, more resources are initially required, thereby increasing, the total cost of security. There would be less need for frequent modification. Challenges would be rare and the need for compliance reviews would not necessarily be less.

CISM Certified Information Security Manager – Question1104

An information security manager reviewed the access control lists and observed that privileged access was granted to an entire department. Which of the following should the information security manager do FIRST?

A.
Review the procedures for granting access
B. Establish procedures for granting emergency access
C. Meet with data owners to understand business needs
D. Redefine and implement proper access rights

Correct Answer: C

Explanation:

Explanation:
An information security manager must understand the business needs that motivated the change prior to taking any unilateral action. Following this, all other choices could be correct depending on the priorities set by the business unit.

CISM Certified Information Security Manager – Question1103

To ensure that all information security procedures are functional and accurate, they should be designed with the involvement of:

A.
end users.
B. legal counsel.
C. operational units.
D. audit management.

Correct Answer: C

Explanation:

Explanation:
Procedures at the operational level must be developed by or with the involvement of operational units that will use them. This will ensure that they are functional and accurate. End users and legal counsel are normally not involved in procedure development. Audit management generally oversees information security operations but does not get involved at the procedural level.

CISM Certified Information Security Manager – Question1102

In organizations where availability is a primary concern, the MOST critical success factor of the patch management procedure would be the:

A.
testing time window prior to deployment.
B. technical skills of the team responsible.
C. certification of validity for deployment.
D. automated deployment to all the servers.

Correct Answer: A

Explanation:

Explanation:
Having the patch tested prior to implementation on critical systems is an absolute prerequisite where availability is a primary concern because deploying patches that could cause a system to fail could be worse than the vulnerability corrected by the patch. It makes no sense to deploy patches on every system. Vulnerable systems should be the only candidate for patching. Patching skills are not required since patches are more often applied via automated tools.

CISM Certified Information Security Manager – Question1101

In business-critical applications, user access should be approved by the:

A.
information security manager.
B. data owner.
C. data custodian.
D. business management.

Correct Answer: B

Explanation:

Explanation:
A data owner is in the best position to validate access rights to users due to their deep understanding of business requirements and of functional implementation within the application. This responsibility should be enforced by the policy. An information security manager will coordinate and execute the implementation of the role-based access control. A data custodian will ensure that proper safeguards are in place to protect the data from unauthorized access; it is not the data custodian’s responsibility to assign access rights. Business management is not. in all cases, the owner of the data.

CISM Certified Information Security Manager – Question1100

In business critical applications, where shared access to elevated privileges by a small group is necessary, the BEST approach to implement adequate segregation of duties is to:

A.
ensure access to individual functions can be granted to individual users only.
B. implement role-based access control in the application.
C. enforce manual procedures ensuring separation of conflicting duties.
D. create service accounts that can only be used by authorized team members.

Correct Answer: B

Explanation:

Explanation:
Role-based access control is the best way to implement appropriate segregation of duties. Roles will have to be defined once and then the user could be changed from one role to another without redefining the content of the role each time. Access to individual functions will not ensure appropriate segregation of duties. Giving a user access to all functions and implementing, in parallel, a manual procedure ensuring segregation of duties is not an effective method, and would be difficult to enforce and monitor. Creating service accounts that can be used by authorized team members would not provide any help unless their roles are properly segregated.