CISM Certified Information Security Manager – Question0929

The BEST way to ensure that information security policies are followed is to:

A.
distribute printed copies to all employees.
B. perform periodic reviews for compliance.
C. include escalating penalties for noncompliance.
D. establish an anonymous hotline to report policy abuses.

Correct Answer: B

Explanation:

Explanation:
The best way to ensure that information security policies are followed is to periodically review levels of compliance. Distributing printed copies, advertising an abuse hotline or linking policies to an international standard will not motivate individuals as much as the consequences of being found in noncompliance. Escalating penalties will first require a compliance review.

CISM Certified Information Security Manager – Question0928

A web-based business application is being migrated from test to production. Which of the following is the MOST important management signoff for this migration?

A.
User
B. Network
C. Operations
D. Database

Correct Answer: A

Explanation:

Explanation:
As owners of the system, user management signoff is the most important. If a system does not meet the needs of the business, then it has not met its primary objective. The needs of network, operations and database management are secondary to the needs of the business.

CISM Certified Information Security Manager – Question0927

The BEST way to ensure that security settings on each platform are in compliance with information security policies and procedures is to:

A.
perform penetration testing.
B. establish security baselines.
C. implement vendor default settings.
D. link policies to an independent standard.

Correct Answer: B

Explanation:

Explanation:
Security baselines will provide the best assurance that each platform meets minimum criteria. Penetration testing will not be as effective and can only be performed periodically. Vendor default settings will not necessarily meet the criteria set by the security policies, while linking policies to an independent standard will not provide assurance that the platforms meet these levels of security.

CISM Certified Information Security Manager – Question0926

During the security review of a legacy business application, it was discovered that sensitive client data is not encrypted in storage, which does not comply with the organization’s information security policy. Which of the following would be the information security manager’s BEST course of action?

A.
Implement encryption on client data.
B. Report the noncompliance to senior management.
C. Analyze compensating controls and assess the associated risk.
D. Determine the cost of encryption and discuss with the application owner.

Correct Answer: C

CISM Certified Information Security Manager – Question0924

During a review to approve a penetration test plan, which of the following should be an information security manager’s PRIMARY concern?

A.
Penetration test team’s deviation from scope
B. Unauthorized access to administrative utilities
C. False positive alarms to operations staff
D. Impact on production systems

Correct Answer: D

CISM Certified Information Security Manager – Question0922

A validated patch to address a new vulnerability that may affect a mission-critical server has been released. What should be done immediately?

A.
Add mitigating controls.
B. Take the server off-line and install the patch.
C. Check the server’s security and install the patch.
D. Conduct an impact analysis.

Correct Answer: D

CISM Certified Information Security Manager – Question0921

Which of the following is the BEST method to defend against social engineering attacks?

A.
Periodically perform antivirus scans to identify malware.
B. Communicate guidelines to limit information posted to public sites.
C. Employ the use of a web-content filtering solution.
D. Monitor for unauthorized access attempts and failed logins.

Correct Answer: C

CISM Certified Information Security Manager – Question0920

Which of the following is the BEST way to identify the potential impact of a successful attack on an organization’s mission critical applications?

A.
Conduct penetration testing.
B. Execute regular vulnerability scans.
C. Perform independent code review.
D. Perform application vulnerability review.

Correct Answer: A