CISM Certified Information Security Manager – Question1379

A root kit was used to capture detailed accounts receivable information. To ensure admissibility of evidence from a legal standpoint, once the incident was identified and the server isolated, the next step should be to:

A.
document how the attack occurred.
B. notify law enforcement.
C. take an image copy of the media.
D. close the accounts receivable system.

Correct Answer: C

Explanation:

Explanation: Taking an image copy of the media is a recommended practice to ensure legal admissibility. All of the other choices are subsequent and may be supplementary.

CISM Certified Information Security Manager – Question1378

A customer credit card database has been breached by hackers. The FIRST step in dealing with this attack should be to:

A.
confirm the incident.
B. notify senior management.
C. start containment.
D. notify law enforcement.

Correct Answer: A

Explanation:

Explanation:
Asserting that the condition is a true security incident is the necessary first step in determining the correct response. The containment stage would follow. Notifying senior management and law enforcement could be part of the incident response process that takes place after confirming an incident.

CISM Certified Information Security Manager – Question1377

Which of the following situations would be the MOST concern to a security manager?

A.
Audit logs are not enabled on a production server
B. The logon ID for a terminated systems analyst still exists on the system
C. The help desk has received numerous results of users receiving phishing e-mails
D. A Trojan was found to be installed on a system administrator's laptop

Correct Answer: D

Explanation:

Explanation:
The discovery of a Trojan installed on a system’s administrator’s laptop is highly significant since this may mean that privileged user accounts and passwords may have been compromised. The other choices, although important, do not pose as immediate or as critical a threat.

CISM Certified Information Security Manager – Question1376

Which of the following provides the BKST confirmation that the business continuity/disaster recovery plan objectives have been achieved?

A.
The recovery time objective (RTO) was not exceeded during testing
B. Objective testing of the business continuity/disaster recovery plan has been carried out consistently
C. The recovery point objective (RPO) was proved inadequate by disaster recovery plan testing
D. Information assets have been valued and assigned to owners per the business continuity plan, disaster recovery plan

Correct Answer: A

Explanation:

Explanation:
Consistent achievement of recovery time objective (RTO) objectives during testing provides the most objective evidence that business continuity/disaster recovery plan objectives have been achieved. The successful testing of the business continuity/disaster recover) plan within the stated RTO objectives is the most indicative evidence that the business needs are being met. Objective testing of the business continuity/ disaster recovery plan will not serve as a basis for evaluating the alignment of the risk management process in business continuity/disaster recovery planning. Mere valuation and assignment of information assets to owners (per the business continuity/disaster recovery plan) will not serve as a basis for evaluating the alignment of the risk management process in business continuity/disaster recovery planning.

CISM Certified Information Security Manager – Question1375

The PRIORITY action to be taken when a server is infected with a virus is to:

A.
isolate the infected server(s) from the network.
B. identify all potential damage caused by the infection.
C. ensure that the virus database files are current.
D. establish security weaknesses in the firewall.

Correct Answer: A

Explanation:

Explanation:
The priority in this event is to minimize the effect of the virus infection and to prevent it from spreading by removing the infected server(s) from the network. After the network is secured from further infection, the damage assessment can be performed, the virus database updated and any weaknesses sought.

CISM Certified Information Security Manager – Question1374

An intrusion detection system (IDS) should:

A.
run continuously
B. ignore anomalies
C. require a stable, rarely changed environment
D. be located on the network

Correct Answer: A

Explanation:

Explanation:
If an intrusion detection system (IDS) does not run continuously the business remains vulnerable. An IDS should detect, not ignore anomalies. An IDS should be flexible enough to cope with a changing environment. Both host and network based IDS are recommended for adequate detection.

CISM Certified Information Security Manager – Question1373

In designing a backup strategy that will be consistent with a disaster recovery strategy, the PRIMARY factor to be taken into account will be the:

A.
volume of sensitive data.
B. recovery point objective (RPO).
C. recovery' time objective (RTO).
D. interruption window.

Correct Answer: B

Explanation:

Explanation:
The recovery point objective (RPO) defines the maximum loss of data (in terms of time) acceptable by the business (i.e., age of data to be restored). It will directly determine the basic elements of the backup strategy frequency of the backups and what kind of backup is the most appropriate (disk-to-disk, on tape, mirroring). The volume of data will be used to determine the capacity of the backup solution. The recovery time objective (RTO) — the time between disaster and return to normal operation — will not have any impact on the backup strategy. The availability to restore backups in a time frame consistent with the interruption window will have to be checked and will influence the strategy (e.g., full backup vs. incremental), but this will not be the primary factor.

CISM Certified Information Security Manager – Question1372

When designing the technical solution for a disaster recovery site, the PRIMARY factor that should be taken into consideration is the:

A.
services delivery objective.
B. recovery time objective (RTO).
C. recovery window.
D. maximum tolerable outage (MTO).

Correct Answer: C

Explanation:

Explanation:
The length of the recovery window is defined by business management and determines the acceptable time frame between a disaster and the restoration of critical services/applications. The technical implementation of the disaster recovery (DR) site will be based on this constraint, especially the choice between a hot, warm or cold site. The service delivery objective is supported during the alternate process mode until the normal situation is restored, which is directly related to business needs. The recovery time objective (RTO) is commonly agreed to be the time frame between a disaster and the return to normal operations. It is then longer than the interruption window and is very difficult to estimate in advance. The time frame between the reduced operation mode at the end of the interruption window and the return to normal operations depends on the magnitude of the disaster. Technical disaster recovery solutions alone will not be used for returning to normal operations. Maximum tolerable outage (MTO) is the maximum time acceptable by a company operating in reduced mode before experiencing losses. Theoretically, recovery time objectives (RTOs) equal the interruption window plus the maximum tolerable outage. This will not be the primary factor for the choice of the technical disaster recovery solution.

CISM Certified Information Security Manager – Question1371

Which of the following actions should lake place immediately after a security breach is reported to an information security manager?

A.
Confirm the incident
B. Determine impact
C. Notify affected stakeholders
D. Isolate the incident

Correct Answer: A

Explanation:

Explanation: Before performing analysis of impact, resolution, notification or isolation of an incident, it must be validated as a real security incident.

CISM Certified Information Security Manager – Question1370

What is the FIRST action an information security manager should take when a company laptop is reported stolen?

A.
Evaluate the impact of the information loss
B. Update the corporate laptop inventory
C. Ensure compliance with reporting procedures
D. Disable the user account immediately

Correct Answer: C

Explanation:

Explanation: The key step in such an incident is to report it to mitigate any loss. After this, the other actions should follow.