CISM Sample Exam Questions
CISM Sample Exam Questions
1. Which of the following factors BEST helps determine the appropriate protection level
for an information asset?
4. What is the MOST essential attribute of an effective key risk indicator (KRI)?
A. A basis for determining the best logical security architecture for the
organization
B. Management intent and direction for security activities
C. Provides users guidance on how to operate securely in everyday tasks
D. Helps IT auditors ensure compliance
7. The most important reason to make sure there is good communication about security
throughout the organization is:
A. Relies on corporate counsel to advise which regulations are the most relevant
B. Stays current with all relevant regulations and requests legal interpretation
C. Involves all impacted departments and treats regulations as just another risk
D. Ignores many of the regulations that have no teeth
9. The most important consideration in developing security policies is:
10. Which one of the following regulatory schemes introduces information security
requirements specific to the handling of credit cards?
A. FERPA
B. SOX
C. HIPAA
D. PCI DSS
11. The assignment of roles and responsibilities will be most effective if:
12. The primary benefit that organizations derive from effective information security
governance is:
A. IT Service Management
B. Corporate Governance
C. Enterprise IT Management
D. All of the above
14. Betty is preparing to publish a new Information Security Policy for her organization and
is drafting an email message announcing the new policy and informing employees
about their responsibilities. Who would be the most effective signatory for the
message?
A. President/CEO
B. Policy Administrator
C. Chief Information Officer
D. Information Security Officer
15. What international standard provides a consistent set of security objectives for
information technology and is published by ISACA?
A. SP 800-53
B. ITIL
C. ISO 27001
D. COBIT
A. Hybrid
B. Flexible
C. Centralized
D. Distributed
18. Which one of the following items is not commonly found in an information security
governance framework?
A. Security Standards
B. Security Strategies
C. Security Guidelines
D. Security Policies
19. Which of the following is not normally a part of the Information Security Management
System framework created by Security policies?
A. Control
B. Evaluate
C. Report
D. Plan
A. Oversight
B. Utilization of resources
C. Allocation of resources
D. Strategic planning
21. Which of the following is part of a security governance framework?
A. Risk Management
B. Organization Structure
C. Compliance Monitoring
D. All of the above
A. COBIT
B. NIST 800-53A
C. ISO 17799
D. SysTrust
A. Fast path
B. Distributed
C. Centralized
D. All of the above
A. Confidentiality
B. Availability
C. Integrity
D. Accountability
A. Least Privileges
B. Job Sensibility
C. Separation of Duties
D. Job Rotation
26. Which of the following is not used by Kerberos to protect the network?
A. Authorization
B. Accounting
C. Authentication
D. Auditing
A. Critical Change
B. Normal Change
C. Standard Change
D. Emergency Change
A. Biometric scan
B. Authentication device
C. Intrusion Detection System
D. Access Control List
A. Directories
B. Profiles
C. Web access
D. Account management
A. Single-factor authentication
B. Two-factor authentication
C. Three-factor authentication
D. All of the above
31. Comparison of current performance against potential performance is a function of what
type of risk assessment method?
A. Baseline Modeling
B. Cost Benefit Analysis
C. Qualitative Analysis
D. Gap analysis
32. When a control operates without needing to overlap its activities with another control,
the control is considered what?
A. Distinct
B. Independent
C. Reliable
D. Sustainable
33. Which security policy covers the behaviour of remote employees in conducting
business offsite?
A. Data Protection
B. Proper use of IT assets
C. Social Responsibility
D. Security Awareness
34. The authoritative voice behind information security governance falls to what business
function?
A. Steering Committee
B. Chief Information Security Officer
C. Board of Directors
D. Executives
35. The alignment of information security objectives with business strategy is the function
of what discipline?
36. What is the security concern that incorporates preventing the accuracy and
completeness of information from being altered from unauthorized sources?
A. Integrity
B. Availability
C. Confidentiality
D. Accountability
37. What type of security measure ensures that security incidents can be handled at the
earliest moment possible?
A. Preventive
B. Detective
C. Reductive
D. Repressive
38. Ensuring all decision-making structure and activities are available to inspect describes
what characteristics of information Security Governance?
A. Responsibility
B. Fairness
C. Accountability
D. Transparency
39. Which of the following statements are true?
A. Threat
B. Vulnerability
C. Risk
D. Control
41. What type of malicious software is used to track user information and activities?
A. Password crackers
B. Mobile code
C. Trojan horses
D. Spyware
42. Traffic can be permitted and denied using what security control?
A. Passwords
B. Routers
C. Access Control Lists
D. All of the above
43. Which of the following encryption algorithms is an example of an asymmetric
algorithm?
A. DES
B. RSA
C. AES
D. RD5
A. Biometric
B. Synchronous
C. Asynchronous
D. Integrated Circuit
A. Monitoring
B. Protocols
C. User Management
D. Policies
A. Objective
B. Measurable
C. Descriptive
D. Time-consuming
A. Risk Mitigation
B. Risk Avoidance
C. Risk Acceptance
D. Risk Transfer
48. What are security activities driven by?
A. Policies
B. Risks
C. Problems
D. All of the above
A. Responsibility
B. Dependency
C. Accountability
D. Fairness
A. Preventive
B. Detective
C. Corrective
D. Reductive
A. Strategic
B. Operational
C. Reporting
D. Legal
53. What is the process for selecting and implementing measures to impact risk called?
A. Risk Management
B. Risk Treatment
C. Risk Assessment
D. Control
54. Which of the following responses to risk is considered the most appropriate?
A. Avoiding
B. Accepting
C. Insuring
D. Any of the above
A. Aversion
B. Hedging
C. Appetite
D. All of the above
57. Which one of the following is not a core goal of information security?
A. Availability
B. Authorization
C. Confidentiality
D. Integrity
58. What individual in an organization bears direct responsibility for ensuring the
protection of business information through risk management, user education, control
implementation, incident management and related tasks?
A. President/CEO
B. Information Security Officer
C. Board Chairperson
D. Chief Information Officer
A. Reliability
B. Availability
C. Confidentiality
D. Integrity
60. Who has primary responsibility for the governance of a publicly traded corporation?
A. Shareholders
B. Board of Directors
C. President
D. Chief Executive Officer
61. Which one of the following types of metric measures the actions that lead to an
organization achieving its primary strategic direction?
A. KSI
B. KRI
C. KGI
D. KPI
62. Which of the following choices BEST justifies an information security program?
A. Vulnerabilities
B. Exposures
C. Threats
D. Impacts
64. A company uses a single employee to update the servers, review the audit logs and
maintain access controls. Which of the following choices is the BEST compensating
control?
65. Which of the following requirements is the MOST important when developing
information security governance?
66. What is the MOST important consideration when developing a business case for an
information security investment?
67. Which of the following operational risks represents the assurance that the provision of
a quality product is not overshadowed by the production costs of that product?
69. Which risk management step is responsible for identifying the interdependencies
between groups of risks?
A. Identification
B. Monitoring
C. Assessment
D. Prioritization.
A. An identification method
B. An inventory of exposures
C. A Schedule of monitored risks
D. All of the above
71. Which of the following is not a variable found in quantitative assessments of risks?
A. Frequency
B. Probability
C. Impact
D. Cost
72. Passwords are a form of what type of security control?
A. Logical
B. Administrative
C. Physical
D. All of the above
A. Strategic
B. Financial
C. Information
D. Operational
A. Reliability of data
B. Availability of data
C. Integrity of data
D. Confidentiality of data
76. An organization has decided to implement governance, risk and compliance (GRC)
processes into several critical areas of the enterprise. Which of the following objectives
is the MAIN one?
A. Governance policies
B. Desired outcomes
C. Specific objectives
D. The security strategy
78. Which of the following choices is the BEST indication that the information security
manager is achieving the objective of value delivery?
79. Governance, risk and compliance (GRC) is an emerging approach PRIMARILY for
achieving:
A. Process.
B. Framework.
C. Model.
D. Guideline.
82. Which of the following choices would be the MOST significant key risk indicator (KRI)?
83. New regulatory and legal compliance requirements that will have an effect on
information security will MOST likely come from the:
85. Information security governance must be integrated into all business functions and
activities PRIMARILY to:
86. Maturity levels are an approach to determine the extent that sound practices have
been implemented in an organization based on outcomes. Another approach that has
been developed to achieve essentially the same result is:
87. Which of the following metrics will provide the BEST indication of organizational risk?
A. Emerging technology
B. System compromises
C. Network architecture
D. Organizational goals
89. Senior management is reluctant to budget for the acquisition of an intrusion prevention
system (IPS). The chief information security officer (CISO) should do which of the
following activities?
90. Which of the following choices would BEST align information security objectives to
business objectives?
91. Which of the following choices is the BEST attribute of key risk indicators (KRIs)?
93. The enactment of policies and procedures for preventing hacker intrusions is an
example of an activity that belongs to?
A. Risk management.
B. Compliance.
C. IT management.
D. Governance.
95. Business goals define the strategic direction of the organization. Functional goals
define the tactical direction of a business function. Security goals define the security
direction of the organization. What is the MOST important relationship between these
concepts?
97. Which of the following choices is the MOST important consideration when developing
the security strategy of a company operating in different countries?
98. Information security frameworks can be MOST useful for the information security
manager because they:
99. The MOST important element(s) to consider when developing a business case for a
project is the:
A. A lack of procedures
B. Inadequate governance
C. Poor standards
D. Insufficient training
101. Which of the following should be the FIRST-step in developing an information security
plan?
102. Senior management commitment and support for information security can BEST be
obtained through presentations that:
103. The MOST appropriate role for senior management in supporting information security
is the:
A. Technology constraints.
B. Regulatory requirements.
C. Litigation potential.
D. Business strategy
106. Which of the following represents the MAJOR focus of privacy regulations?
A. Vulnerability assessments.
B. Value analysis.
C. Business climate.
D. Audit recommendations.
108. Retention of business records should PRIMARILY be based on?
111. Which of the following individuals would be in the BEST position to sponsor the
creation of an information security steering group?
A. Notifications
B. Warranties
C. Liabilities
D. Geographic coverage
113. The cost of implementing a security control should not exceed the:
114. When security standard conflicts with a business objective, the situation should be
resolved by:
115. Minimum standards for securing the technical infrastructure should be defined in a
security:
A. Strategy
B. Guidelines
C. Model.
D. Architecture
116. Which of the following is MOST appropriate for inclusion in an information security
strategy?
117. Senior management commitment and support for information security will BEST be
attained by an information security manager by emphasizing:
A. Organizational risk.
B. Organization wide metrics
C. Security needs
D. The responsibilities of organizational units.
118. Which of the following roles would represent a conflict of interest for an information
security manager?
119. Which of the following situations must be corrected FIRST to ensure successful
information security governance within an organization?
A. Technical
B. Regulatory
C. Privacy
D. Business
121. When an organization hires a new information security manager, which of the following
goals should this individual pursue FIRST?
122. It is MOST important that information security architecture be aligned with which of the
following?
A. Policies
B. Procedures
C. Guidelines
D. Standards
124. Security technologies should be selected PRIMARILY on the basis of their:
125. Which of the following are seldom changed in response to technological changes?
A. Standards
B. Procedures
C. Policies
D. Guidelines
126. The MOST important factor in planning for the long-term retention of electronically
stored business records is to take into account potential changes in:
130. Which of the following BEST describes an information security manager's role in a
multidisciplinary team that will address a new regulatory requirement regarding
operational risk?
133. How would an information security manager balance the potentially conflicting
requirements of an international organization's security standards and local regulation?
A. Bring all locations into conformity with the aggregate requirements of all
governmental jurisdictions.
B. Establish baseline standards for all locations and add supplemental standards
as required.
C. Bring all locations into conformity with a generally accepted set of industry best
practices.
D. Establish a baseline standard incorporating those requirements that all
jurisdictions have in common
135. What is the PRIMARY role of the information security manager in the process of
information classification within an organization?
136. An internal audit has identified major weaknesses over IT processing. Which of the
following should an information security manager use to BEST convey sense of
urgency to management?
A. Containment
B. Detection
C. Reaction
D. Recovery
141. Which of the following results from the risk assessment process would BEST assist
risk management decision-making?
A. Control risk
B. Inherent risk
C. Risk exposure
D. Residual risk
142. What would a security manager PRIMARILY utilize when proposing the
implementation of a security solution?
144. Identification and prioritization of business risk enable project managers to?
145. A security manager meeting the requirements for the international flow of personal
data will need to ensure?
A. Data custodian
B. Database administrator
C. Information security officer
D. Data owner
147. Based on the information provided, which of the following situations presents the
GREATEST information security risk for an organization with multiple, but small,
domestic processing locations?
148. Which of the following is responsible for legal and regulatory liability?
149. Which of the following factors is a primary driver for information security governance
that does not require any further justification?