CISM Certified Information Security Manager – Question1079

Which of the following would present the GREATEST risk to information security?

A.
Virus signature files updates are applied to all servers every day
B. Security access logs are reviewed within five business days
C. Critical patches are applied within 24 hours of their release
D. Security incidents are investigated within five business days

Correct Answer: D

Explanation:

Explanation:
Security incidents are configured to capture system events that are important from the security perspective; they include incidents also captured in the security access logs and other monitoring tools. Although, in some instances, they could wait for a few days before they are researched, from the options given this would have the greatest risk to security. Most often, they should be analyzed as soon as possible. Virus signatures should be updated as often as they become available by the vendor, while critical patches should be installed as soon as they are reviewed and tested, which could occur in 24 hours.

CISM Certified Information Security Manager – Question1078

Which of the following is the MOST appropriate method for deploying operating system (OS) patches to production application servers?

A.
Batch patches into frequent server updates
B. Initially load the patches on a test machine
C. Set up servers to automatically download patches
D. Automatically push all patches to the servers

Correct Answer: B

Explanation:

Explanation:
Some patches can conflict with application code. For this reason, it is very important to first test all patches in a test environment to ensure that there are no conflicts with existing application systems. For this reason, choices C and D are incorrect as they advocate automatic updating. As for frequent server updates, this is an incomplete (vague) answer from the choices given.

CISM Certified Information Security Manager – Question1077

What is the BEST way to ensure users comply with organizational security requirements for password complexity?

A.
Include password construction requirements in the security standards
B. Require each user to acknowledge the password requirements
C. Implement strict penalties for user noncompliance
D. Enable system-enforced password configuration

Correct Answer: D

Explanation:

Explanation:
Automated controls are generally more effective in preventing improper actions. Policies and standards provide some deterrence, but are not as effective as automated controls.

CISM Certified Information Security Manager – Question1076

Which of the following is the MOST appropriate individual to ensure that new exposures have not been introduced into an existing application during the change management process?

A.
System analyst
B. System user
C. Operations manager
D. Data security officer

Correct Answer: B

Explanation:

Explanation:
System users, specifically the user acceptance testers, would be in the best position to note whether new exposures are introduced during the change management process. The system designer or system analyst, data security officer and operations manager would not be as closely involved in testing code changes.

CISM Certified Information Security Manager – Question1075

Data owners are normally responsible for which of the following?

A.
Applying emergency changes to application data
B. Administering security over database records
C. Migrating application code changes to production
D. Determining the level of application security required

Correct Answer: D

Explanation:

Explanation:
Data owners approve access to data and determine the degree of protection that should be applied (data classification). Administering database security, making emergency changes to data and migrating code to production are infrastructure tasks performed by custodians of the data.

CISM Certified Information Security Manager – Question1074

Which of the following is an inherent weakness of signature-based intrusion detection systems?

A.
A higher number of false positives
B. New attack methods will be missed
C. Long duration probing will be missed
D. Attack profiles can be easily spoofed

Correct Answer: B

Explanation:

Explanation:
Signature-based intrusion detection systems do not detect new attack methods for which signatures have not yet been developed. False positives are not necessarily any higher, and spoofing is not relevant in this case. Long duration probing is more likely to fool anomaly-based systems (boiling frog technique).

CISM Certified Information Security Manager – Question1073

What is the MOST effective access control method to prevent users from sharing files with unauthorized users?

A.
Mandatory
B. Discretionary
C. Walled garden
D. Role-based

Correct Answer: A

Explanation:

Explanation:
Mandatory access controls restrict access to files based on the security classification of the file. This prevents users from sharing files with unauthorized users. Role-based access controls grant access according to the role assigned to a user; they do not prohibit file sharing. Discretionary and lattice-based access controls are not as effective as mandatory access controls in preventing file sharing. A walled garden is an environment that controls a user’s access to web content and services. In effect, the walled garden directs the user’s navigation within particular areas, and does not necessarily prevent sharing of other material.

CISM Certified Information Security Manager – Question1072

Which of the following is the MOST appropriate method to protect a password that opens a confidential file?

A.
Delivery path tracing
B. Reverse lookup translation
C. Out-of-band channels
D. Digital signatures

Correct Answer: C

Explanation:

Explanation:
Out-of-band channels are useful when it is necessary, for confidentiality, to break a message into two parts that are then sent by different means. Digital signatures only provide nonrepudiation. Reverse lookup translation involves converting; in Internet Protocol (IP) address to a username. Delivery path tracing shows the route taken but does not confirm the identity of the sender.

CISM Certified Information Security Manager – Question1071

Security audit reviews should PRIMARILY:

A.
ensure that controls operate as required.
B. ensure that controls are cost-effective.
C. focus on preventive controls.
D. ensure controls are technologically current.

Correct Answer: A

Explanation:

Explanation:
The primary objective of a security review or audit should be to provide assurance on the adequacy of security controls. Reviews should focus on all forms of control, not just on preventive control. Cost-effectiveness and technological currency are important but not as critical.

CISM Certified Information Security Manager – Question1070

Which of the following are the MOST important individuals to include as members of an information security steering committee?

A.
Direct reports to the chief information officer
B. IT management and key business process owners
C. Cross-section of end users and IT professionals
D. Internal audit and corporate legal departments

Correct Answer: B

Explanation:

Explanation:
Security steering committees provide a forum for management to express its opinion and take some ownership in the decision making process. It is imperative that business process owners be included in this process. None of the other choices includes input by business process owners.