CISM Certified Information Security Manager – Question1369

Emergency actions are taken at the early stage of a disaster with the purpose of preventing injuries or loss of life and:

A.
determining the extent of property damage.
B. preserving environmental conditions.
C. ensuring orderly plan activation.
D. reducing the extent of operational damage.

Correct Answer: D

Explanation:

Explanation:
During an incident, emergency actions should minimize or eliminate casualties and damage to the business operation, thus reducing business interruptions. Determining the extent of property damage is not the consideration; emergency actions should minimize, not determine, the extent of the damage. Protecting/preserving environmental conditions may not be relevant. Ensuring orderly plan activation is important but not as critical as reducing damage to the operation.

CISM Certified Information Security Manager – Question1368

In the course of responding 10 an information security incident, the BEST way to treat evidence for possible legal action is defined by:

A.
international standards.
B. local regulations.
C. generally accepted best practices.
D. organizational security policies.

Correct Answer: B

Explanation:

Explanation: Legal follow-up will most likely be performed locally where the incident took place; therefore, it is critical that the procedure of treating evidence is in compliance with local regulations. In certain countries, there are strict regulations on what information can be collected. When evidence collected is not in compliance with local regulations, it may not be admissible in court. There are no common regulations to treat computer evidence that are accepted internationally. Generally accepted best practices such as a common chain-of-custody concept may have different implementation in different countries, and thus may not be a good assurance that evidence will be admissible. Local regulations always take precedence over organizational security policies.

CISM Certified Information Security Manager – Question1367

Evidence from a compromised server has to be acquired for a forensic investigation. What would be the BEST source?

A.
A bit-level copy of all hard drive data
B. The last verified backup stored offsite
C. Data from volatile memory
D. Backup servers

Correct Answer: A

Explanation:

Explanation:
The bit-level copy image file ensures forensic quality evidence that is admissible in a court of law. Choices B and D may not provide forensic quality data for investigative work, while choice C alone may not provide enough evidence.

CISM Certified Information Security Manager – Question1366

A web server in a financial institution that has been compromised using a super-user account has been isolated, and proper forensic processes have been followed. The next step should be to:

A.
rebuild the server from the last verified backup.
B. place the web server in quarantine.
C. shut down the server in an organized manner.
D. rebuild the server with original media and relevant patches.

Correct Answer: D

Explanation:

Explanation:
The original media should be used since one can never be sure of all the changes a super-user may have made nor the timelines in which these changes were made. Rebuilding from the last known verified backup is incorrect since the verified backup may have been compromised by the super-user at a different time. Placing the web server in quarantine should have already occurred in the forensic process. Shut down in an organized manner is out of sequence and no longer a problem. The forensic process is already finished and evidence has already been acquired.

CISM Certified Information Security Manager – Question1365

Detailed business continuity plans should be based PRIMARILY on:

A.
consideration of different alternatives.
B. the solution that is least expensive.
C. strategies that cover all applications.
D. strategies validated by senior management.

Correct Answer: D

Explanation:

Explanation:
A recovery strategy identifies the best way to recover a system in ease of disaster and provides guidance based on detailed recovery procedures that can be developed. Different strategies should be developed and all alternatives presented to senior management. Senior management should select the most appropriate strategy from the alternatives provided. The selected strategy should be used for further development of the detailed business continuity plan. The selection of strategy depends on criticality of the business process and applications supporting the processes. It need not necessarily cover all applications. All recovery strategies have associated costs, which include costs of preparing for disruptions and putting them to use in the event of a disruption. The latter can be insured against, but not the former. The best recovery option need not be the least expensive.

CISM Certified Information Security Manager – Question1364

What is the PRIMARY objective of a post-event review in incident response?

A.
Adjust budget provisioning
B. Preserve forensic data
C. Improve the response process
D. Ensure the incident is fully documented

Correct Answer: C

Explanation:

Explanation:
The primary objective is to find any weakness in the current process and improve it. The other choices are all secondary.

CISM Certified Information Security Manager – Question1363

Why is "slack space" of value to an information security manager as pan of an incident investigation?

A.
Hidden data may be stored there
B. The slack space contains login information
C. Slack space is encrypted
D. It provides flexible space for the investigation

Correct Answer: A

Explanation:

Explanation:
“Slack space” is the unused space between where the fdc data end and the end of the cluster the data occupy. Login information is not typically stored in the slack space. Encryption for the slack space is no different from the rest of the file system. The slack space is not a viable means of storage during an investigation.

CISM Certified Information Security Manager – Question1362

Isolation and containment measures for a compromised computer has been taken and information security management is now investigating. What is the MOST appropriate next step?

A.
Run a forensics tool on the machine to gather evidence
B. Reboot the machine to break remote connections
C. Make a copy of the whole system's memory
D. Document current connections and open Transmission Control Protocol/User Datagram Protocol (TCP/ I'DP) ports

Correct Answer: C

Explanation:

Explanation:
When investigating a security breach, it is important to preserve all traces of evidence left by the invader. For this reason, it is imperative to preserve the memory’ contents of the machine in order to analyze them later. The correct answer is choice C because a copy of the whole system’s memory is obtained for future analysis by running the appropriate tools. This is also important from a legal perspective since an attorney may suggest that the system was changed during the conduct of the investigation. Running a computer forensics tool in the compromised machine will cause the creation of at least one process that may overwrite evidence. Rebooting the machine will delete the contents of the memory, erasing potential evidence. Collecting information about current connections and open Transmission Control Protocol/User Datagram Protocol (TCP/UDP) ports is correct, but doing so by using tools may also erase memory contents.

CISM Certified Information Security Manager – Question1361

When properly tested, which of the following would MOST effectively support an information security manager in handling a security breach?

A.
Business continuity plan
B. Disaster recovery plan
C. Incident response plan
D. Vulnerability management plan

Correct Answer: C

Explanation:

Explanation: An incident response plan documents the step-by-step process to follow, as well as the related roles and responsibilities pertaining to all parties involved in responding to an information security breach. A business continuity plan or disaster recovery plan would be triggered during the execution of the incident response plan in the case of a breach impacting the business continuity. A vulnerability management plan is a procedure to address technical vulnerabilities and mitigate the risk through configuration changes (patch management).

CISM Certified Information Security Manager – Question1360

Which of the following would represent a violation of the chain of custody when a backup tape has been identified as evidence in a fraud investigation? The tape was:

A.
removed into the custody of law enforcement investigators.
B. kept in the tape library' pending further analysis.
C. sealed in a signed envelope and locked in a safe under dual control.
D. handed over to authorized independent investigators.

Correct Answer: B

Explanation:

Explanation: Since a number of individuals would have access to the tape library, and could have accessed and tampered with the tape, the chain of custody could not be verified. All other choices provide clear indication of who was in custody of the tape at all times.