CISM Certified Information Security Manager – Question1409

In the course of examining a computer system for forensic evidence, data on the suspect media were inadvertently altered. Which of the following should have been the FIRST course of action in the investigative process?

A.
Perform a backup of the suspect media to new media.
B. Perform a bit-by-bit image of the original media source onto new media.
C. Make a copy of all files that are relevant to the investigation.
D. Run an error-checking program on all logical drives to ensure that there are no disk errors.

Correct Answer: B

Explanation:

Explanation:
The original hard drive or suspect media should never be used as the source for analysis. The source or original media should be physically secured and only used as the master to create a bit-by-bit image. The original should be stored using the appropriate procedures, depending on location. The image created for forensic analysis should be used. A backup does not preserve 100 percent of the data, such as erased or deleted files and data in slack space — which may be critical to the investigative process. Once data from the source are altered, they may no longer be admissible in court. Continuing the investigation, documenting the date, time and data altered, are actions that may not be admissible in legal proceedings. The organization would need to know the details of collecting and preserving forensic evidence relevant to their jurisdiction.

CISM Certified Information Security Manager – Question1408

Of the following, which is the MOST important aspect of forensic investigations?

A.
The independence of the investigator
B. Timely intervention
C. Identifying the perpetrator
D. Chain of custody

Correct Answer: D

Explanation:

Explanation:
Establishing the chain of custody is one of the most important steps in conducting forensic investigations since it preserves the evidence in a manner that is admissible in court. The independence of the investigator may be important, but is not the most important aspect. Timely intervention is important for containing incidents, but not as important for forensic investigation. Identifying the perpetrator is important, but maintaining the chain of custody is more important in order to have the perpetrator convicted in court.

CISM Certified Information Security Manager – Question1407

Which of the following would be MOST appropriate for collecting and preserving evidence?

A.
Encrypted hard drives
B. Generic audit software
C. Proven forensic processes
D. Log correlation software

Correct Answer: C

Explanation:

Explanation: When collecting evidence about a security incident, it is very important to follow appropriate forensic procedures to handle electronic evidence by a method approved by local jurisdictions. All other options will help when collecting or preserving data about the incident; however, these data might not be accepted as evidence in a court of law if they are not collected by a method approved by local jurisdictions.

CISM Certified Information Security Manager – Question1406

Which of the following would be a MAJOR consideration for an organization defining its business continuity plan (BCP) or disaster recovery program (DRP)?

A.
Setting up a backup site
B. Maintaining redundant systems
C. Aligning with recovery time objectives (RTOs)
D. Data backup frequency

Correct Answer: C

Explanation:

Explanation:
BCP, DRP should align with business RTOs. The RTO represents the amount of time allowed for the recovery of a business function or resource after a disaster occurs. The RTO must be taken into consideration when prioritizing systems for recovery efforts to ensure that those systems that the business requires first are the ones that are recovered first.

CISM Certified Information Security Manager – Question1405

An unauthorized user gained access to a merchant's database server and customer credit card information. Which of the following would be the FIRST step to preserve and protect unauthorized intrusion activities?

A.
Shut down and power off the server.
B. Duplicate the hard disk of the server immediately.
C. Isolate the server from the network.
D. Copy the database log file to a protected server.

Correct Answer: C

Explanation:

Explanation:
Isolating the server will prevent further intrusions and protect evidence of intrusion activities left in memory and on the hard drive. Some intrusion activities left in virtual memory may be lost if the system is shut down. Duplicating the hard disk will only preserve the evidence on the hard disk, not the evidence in virtual memory, and will not prevent further unauthorized access attempts. Copying the database log file to a protected server will not provide sufficient evidence should the organization choose to pursue legal recourse.

CISM Certified Information Security Manager – Question1404

An information security manager believes that a network file server was compromised by a hacker. Which of the following should be the FIRST action taken?

A.
Unsure that critical data on the server are backed up.
B. Shut down the compromised server.
C. Initiate the incident response process.
D. Shut down the network.

Correct Answer: C

Explanation:

Explanation:
The incident response process will determine the appropriate course of action. If the data have been corrupted by a hacker, the backup may also be corrupted. Shutting down the server is likely to destroy any forensic evidence that may exist and may be required by the investigation. Shutting down the network is a drastic action, especially if the hacker is no longer active on the network.

CISM Certified Information Security Manager – Question1403

What task should be performed once a security incident has been verified?

A.
Identify the incident.
B. Contain the incident.
C. Determine the root cause of the incident.
D. Perform a vulnerability assessment.

Correct Answer: B

Explanation:

Explanation:
Identifying the incident means verifying whether an incident has occurred and finding out more details about the incident. Once an incident has been confirmed (identified), the incident management team should limit further exposure. Determining the root cause takes place after the incident has been contained. Performing a vulnerability assessment takes place after the root cause of an incident has been determined, in order to find new vulnerabilities.

CISM Certified Information Security Manager – Question1402

The PRIMARY consideration when defining recovery time objectives (RTOs) for information assets is:

A.
regulatory' requirements.
B. business requirements.
C. financial value.
D. IT resource availability.

Correct Answer: B

Explanation:

Explanation:
The criticality to business should always drive the decision. Regulatory requirements could be more flexible than business needs. The financial value of an asset could not correspond to its business value. While a consideration, IT resource availability is not a primary factor.

CISM Certified Information Security Manager – Question1401

A possible breach of an organization's IT system is reported by the project manager. What is the FIRST thing the incident response manager should do?

A.
Run a port scan on the system
B. Disable the logon ID
C. Investigate the system logs
D. Validate the incident

Correct Answer: D

Explanation:

Explanation:
When investigating a possible incident, it should first be validated. Running a port scan on the system, disabling the logon IDs and investigating the system logs may be required based on preliminary forensic investigation, but doing so as a first step may destroy the evidence.

CISM Certified Information Security Manager – Question1400

An organization has verified that its customer information was recently exposed. Which of the following is the FIRST step a security manager should take in this situation?

A.
Inform senior management.
B. Determine the extent of the compromise.
C. Report the incident to the authorities.
D. Communicate with the affected customers.

Correct Answer: B

Explanation:

Explanation: Before reporting to senior management, affected customers or the authorities, the extent of the exposure needs to be assessed.