CISM Certified Information Security Manager – Question1359

The PRIMARY purpose of performing an internal attack and penetration test as part of an incident response program is to identify:

A.
weaknesses in network and server security.
B. ways to improve the incident response process.
C. potential attack vectors on the network perimeter.
D. the optimum response to internal hacker attacks.

Correct Answer: A

Explanation:

Explanation: An internal attack and penetration test are designed to identify weaknesses in network and server security. They do not focus as much on incident response or the network perimeter.

CISM Certified Information Security Manager – Question1358

A computer incident response team (CIRT) manual should PRIMARILY contain which of the following documents?

A.
Risk assessment results
B. Severity criteria
C. Emergency call tree directory
D. Table of critical backup files

Correct Answer: B

Explanation:

Explanation: Quickly ranking the severity criteria of an incident is a key element of incident response. The other choices refer to documents that would not likely be included in a computer incident response team (CIRT) manual.

CISM Certified Information Security Manager – Question1357

Which of the following application systems should have the shortest recovery time objective (RTO)?

A.
Contractor payroll
B. Change management
C. E-commerce web site
D. Fixed asset system

Correct Answer: C

Explanation:

Explanation: In most businesses where an e-commerce site is in place, it would need to be restored in a matter of hours, if not minutes. Contractor payroll, change management and fixed assets would not require as rapid a recovery time.

CISM Certified Information Security Manager – Question1356

Which of the following is MOST closely associated with a business continuity program?

A.
Confirming that detailed technical recovery plans exist
B. Periodically testing network redundancy
C. Updating the hot site equipment configuration every quarter
D. Developing recovery time objectives (RTOs) for critical functions

Correct Answer: D

Explanation:

Explanation: Technical recovery plans, network redundancy and equipment needs are all associated with infrastructure disaster recovery. Only recovery time objectives (RTOs) directly relate to business continuity.

CISM Certified Information Security Manager – Question1355

When performing a business impact analysis (BIA), which of the following should calculate the recovery time and cost estimates?

A.
Business continuity coordinator
B. Information security manager
C. Business process owners
D. Industry averages benchmarks

Correct Answer: C

Explanation:

Explanation:
Business process owners are in the best position to understand the true impact on the business that a system outage would create. The business continuity coordinator, industry averages and even information security will not be able to provide that level of detailed knowledge.

CISM Certified Information Security Manager – Question1354

Which of the following is the MOST serious exposure of automatically updating virus signature files on every desktop each Friday at 11:00 p.m. (23.00 hrs.)?

A.
Most new viruses* signatures are identified over weekends
B. Technical personnel are not available to support the operation
C. Systems are vulnerable to new viruses during the intervening week
D. The update's success or failure is not known until Monday

Correct Answer: C

Explanation:

Explanation: Updating virus signature files on a weekly basis carries the risk that the systems will be vulnerable to viruses released during the week; far more frequent updating is essential. All other issues are secondary to this very serious exposure.

CISM Certified Information Security Manager – Question1353

Which of the following are the MOST important criteria when selecting virus protection software?

A.
Product market share and annualized cost
B. Ability to interface with intrusion detection system (IDS) software and firewalls
C. Alert notifications and impact assessments for new viruses
D. Ease of maintenance and frequency of updates

Correct Answer: D

Explanation:

Explanation: For the software to be effective, it must be easy to maintain and keep current. Market share and annualized cost, links to the intrusion detection system (IDS) and automatic notifications are all secondary in nature.

CISM Certified Information Security Manager – Question1352

Which of the following actions should be taken when an information security manager discovers that a hacker is foot printing the network perimeter?

A.
Reboot the border router connected to the firewall
B. Check IDS logs and monitor for any active attacks
C. Update IDS software to the latest available version
D. Enable server trace logging on the DMZ segment

Correct Answer: B

Explanation:

Explanation:
Information security should check the intrusion detection system (IDS) logs and continue to monitor the situation. It would be inappropriate to take any action beyond that. In fact, updating the IDS could create a temporary exposure until the new version can be properly tuned. Rebooting the router and enabling server trace routing would not be warranted.

CISM Certified Information Security Manager – Question1351

Which of the following is the BEST way to verify that all critical production servers are utilizing up-to- date virus signature files?

A.
Verify the date that signature files were last pushed out
B. Use a recently identified benign virus to test if it is quarantined
C. Research the most recent signature file and compare to the console
D. Check a sample of servers that the signature files are current

Correct Answer: D

Explanation:

Explanation:
The only accurate way to check the signature files is to look at a sample of servers. The fact that an update was pushed out to a server does not guarantee that it was properly loaded onto that server. Checking the vendor information to the management console would still not be indicative as to whether the file was properly loaded on the server. Personnel should never release a virus, no matter how benign.

CISM Certified Information Security Manager – Question1350

When an organization is using an automated tool to manage and house its business continuity plans, which of the following is the PRIMARY concern?

A.
Ensuring accessibility should a disaster occur
B. Versioning control as plans are modified
C. Broken hyperlinks to resources stored elsewhere
D. Tracking changes in personnel and plan assets

Correct Answer: A

Explanation:

Explanation:
If all of the plans exist only in electronic form, this presents a serious weakness if the electronic version is dependent on restoration of the intranet or other systems that are no longer available. Versioning control and tracking changes in personnel and plan assets is actually easier with an automated system. Broken hyperlinks are a concern, but less serious than plan accessibility.