CISM Certified Information Security Manager – Question0949

The BEST time to perform a penetration test is after:

A.
an attempted penetration has occurred.
B. an audit has reported weaknesses in security controls.
C. various infrastructure changes are made.
D. a high turnover in systems staff.

Correct Answer: C

Explanation:

Explanation:
Changes in the systems infrastructure are most likely to inadvertently introduce new exposures. Conducting a test after an attempted penetration is not as productive since an organization should not wait until it is attacked to test its defenses. Any exposure identified by an audit should be corrected before it would be appropriate to test. A turnover in administrative staff does not warrant a penetration test, although it may- warrant a review of password change practices and configuration management.

CISM Certified Information Security Manager – Question0948

The BEST way to determine if an anomaly-based intrusion detection system (IDS) is properly installed is to:

A.
simulate an attack and review IDS performance.
B. use a honeypot to check for unusual activity.
C. audit the configuration of the IDS.
D. benchmark the IDS against a peer site.

Correct Answer: A

Explanation:

Explanation:
Simulating an attack on the network demonstrates whether the intrusion detection system (IDS) is properly tuned. Reviewing the configuration may or may not reveal weaknesses since an anomaly-based system uses trends to identify potential attacks. A honeypot is not a good first step since it would need to have already been penetrated. Benchmarking against a peer site would generally not be practical or useful.

CISM Certified Information Security Manager – Question0947

Security policies should be aligned MOST closely with:

A.
industry' best practices.
B. organizational needs.
C. generally accepted standards.
D. local laws and regulations.

Correct Answer: B

Explanation:

Explanation: The needs of the organization should always take precedence. Best practices and local regulations are important, but they do not take into account the total needs of an organization.

CISM Certified Information Security Manager – Question0946

Which of the following areas is MOST susceptible to the introduction of security weaknesses?

A.
Database management
B. Tape backup management
C. Configuration management
D. Incident response management

Correct Answer: C

Explanation:

Explanation: Configuration management provides the greatest likelihood of security weaknesses through misconfiguration and failure to update operating system (OS) code correctly and on a timely basis.

CISM Certified Information Security Manager – Question0945

Of the following, the BEST method for ensuring that temporary employees do not receive excessive access rights is:

A.
mandatory access controls.
B. discretionary access controls.
C. lattice-based access controls.
D. role-based access controls.

Correct Answer: D

Explanation:

Explanation:
Role-based access controls will grant temporary employee access based on the job function to be performed. This provides a better means of ensuring that the access is not more or less than what is required. Discretionary, mandatory and lattice-based access controls are all security models, hut they do not address the issue of temporary employees as well as role-based access controls.

CISM Certified Information Security Manager – Question0944

Nonrepudiation can BEST be assured by using:

A.
delivery path tracing.
B. reverse lookup translation.
C. out-of-hand channels.
D. digital signatures.

Correct Answer: D

Explanation:

Explanation:
Effective nonrepudiation requires the use of digital signatures. Reverse lookup translation involves converting Internet Protocol (IP) addresses to usernames. Delivery path tracing shows the route taken but does not confirm the identity of the sender. Out-of-band channels are useful when, for confidentiality, it is necessary to break a message into two parts that are sent by different means.

CISM Certified Information Security Manager – Question0943

Which of the following environments represents the GREATEST risk to organizational security?

A.
Locally managed file server
B. Enterprise data warehouse
C. Load-balanced, web server cluster
D. Centrally managed data switch

Correct Answer: A

Explanation:

Explanation:
A locally managed file server will be the least likely to conform to organizational security policies because it is generally subject to less oversight and monitoring. Centrally managed data switches, web server clusters and data warehouses are subject to close scrutiny, good change control practices and monitoring.

CISM Certified Information Security Manager – Question0942

Which of the following is MOST important to the successful promotion of good security management practices?

A.
Security metrics
B. Security baselines
C. Management support
D. Periodic training

Correct Answer: C

Explanation:

Explanation:
Without management support, all other efforts will be undermined. Metrics, baselines and training are all important, but they depend on management support for their success.

CISM Certified Information Security Manager – Question0941

When a departmental system continues to be out of compliance with an information security policy's password strength requirements, the BEST action to undertake is to:

A.
submit the issue to the steering committee.
B. conduct an impact analysis to quantify the risks.
C. isolate the system from the rest of the network.
D. request a risk acceptance from senior management.

Correct Answer: B

Explanation:

Explanation:
An impact analysis is warranted to determine whether a risk acceptance should be granted and to demonstrate to the department the danger of deviating from the established policy. Isolating the system would not support the needs of the business. Any waiver should be granted only after performing an impact analysis.

CISM Certified Information Security Manager – Question0940

Prior to having a third party perform an attack and penetration test against an organization, the MOST important action is to ensure that:

A.
the third party provides a demonstration on a test system.
B. goals and objectives are clearly defined.
C. the technical staff has been briefed on what to expect.
D. special backups of production servers are taken.

Correct Answer: B

Explanation:

Explanation:
The most important action is to clearly define the goals and objectives of the test. Assuming that adequate backup procedures are in place, special backups should not be necessary. Technical staff should not be briefed nor should there be a demo as this will reduce the spontaneity of the test.