IT CertificationsAnswer Key

Cism Flashcards

53 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Information security governance is primarily driven by:

ANSWER

Business strategy

QUESTION 2

Who should drive the risk analysis for an organization?

ANSWER

the Security Manager

QUESTION 3

Who should be responsible for enforcing access rights to application data?

ANSWER

Security administrators

QUESTION 4

The MOST important component of a privacy policy is:

ANSWER

notifications

QUESTION 5

Investment in security technology and processes should be based on:

ANSWER

clear alignment with the goals and objectives of the organization

QUESTION 6

Define information security governance

ANSWER

1. A set of policies and procedures that establishes a framework of information security strategies 2. A practice area that ensures efficient utilization of information resources

QUESTION 7

The main purpose of information security governance

ANSWER

to ensure the safety of information including its Confidentiality, Integrity and Availability. Information security governance protects information from loss, misuse, unauthorized usage, and destruction during its life cycle or the time it is being used in an organization.

QUESTION 8

Benefits of information security governance

ANSWER

- accountability for protecting information during important business activities - reduction of the impact of security incidents - reduction in risks to tolerable limits - protection from civil and legal liabilities - enhancement of trust in customer relationships - assurance of policy compliance - protection of company reputation

QUESTION 9

In order to be effective, information security governance needs to provide 6 basic outcomes:

ANSWER

- strategic alignment - value delivery - risk management - performance measurement - resource management - integration

QUESTION 10

Should information security investments be optimized or minimized?

ANSWER

Optimized so that they support business objectives.

QUESTION 11

Primary goals of resource management:

ANSWER

- keeping a record of security practices and processes - acquiring knowledge and making it accessible - building a security architecture that identifies and uses infrastructure resources properly

QUESTION 12

What is Corporate Governance?

ANSWER

Corporate governance is a set of procedures and duties performed by the board of directors and executive management to direct and control the organization. Corporate governance helps the board of directors to • ensure that business objectives are met • provide strategic direction for business activities • verify the efficient use of the organization's resources, and ensure proper handling of business risks

QUESTION 13

Information Security Governance

ANSWER

While corporate governance deals with performance and control at all levels of the organization, information security governance is a subset of corporate governance. Information security governance is concerned with the policies and controls related to protecting information in the organization. It helps you to • ensure that information security objectives are achieved • provide strategic direction for information security activities • ensure the efficient use of information resources, and manage information security risks

QUESTION 14

General components of the Information Security Governance Framework are:

ANSWER

- security strategy - security policies - standards - security organizational structure - metrics and monitoring

QUESTION 15

Steering Committee

ANSWER

Consists of senior representatives of departments that are directly or indirectly affected by information security policies. The steering committee aims to involve all stakeholders influenced by security aspects.

QUESTION 16

Who is responsible for identifying information assets that need to be protected and assigning appropriate priorities and protection levels for them?

ANSWER

The Board of Directors

QUESTION 17

Who is responsible for achieving organizational consent over priorities related to information security and ensuring the involvement of all stakeholders influenced by security considerations?

ANSWER

The Steering Committe

QUESTION 18

Who needs to establish reporting and communication channels in the whole organization to make sure that information security governance is effective?

ANSWER

The CISO

QUESTION 19

Who should establish processes for integrating security with business objectives and provide proper leadership and continuous support to the people working to implement information security?

ANSWER

Executive Management

QUESTION 20

What is GRC?

ANSWER

Governance, Risk Management, Compliance

QUESTION 21

What are the 3 GRC processes?

ANSWER

- Governance is the process that senior management can use to direct and control an organization. It involves developing methods to ensure that all employees of the organization adhere to its policies, standards, and procedures. - Risk management helps you create and implement methods for mitigating risks. Using this process, you can establish the organization's risk tolerance, recognize potential risks and their impact on business operations, and decide the priority for mitigating the risks based on business goals and risk tolerance. - Compliance is the process using which you can supervise the controls and methods that ensure adherence to an organization's policies, standards, and procedures.

QUESTION 22

Systems Theory

ANSWER

Systems Theory is a network of processes, people, technologies, relationships, events, reactions, and results that interact with each other to achieve one common goal. By analyzing these interactions, an information security manager can understand the working of a system in an organization and control any risks to it.

QUESTION 23

4 elements of the information security business model

ANSWER

• organization design and strategy • people • process • technology

QUESTION 24

6 dynamic interconnections of the information security business model

ANSWER

• governance • culture • enablement and support • emergence • human factors • architecture

QUESTION 25

Governance dynamic interconnection of information security business model

ANSWER

The governance dynamic interconnection links the organization and process elements. It involves guiding and controlling an organization.

QUESTION 26

Culture dynamic interconnection of information security business model

ANSWER

The culture dynamic interconnection links the organization and people elements. It represents people's beliefs, opinions, and behaviors.

QUESTION 27

Enablement and Support dynamic interconnection of information security business model

ANSWER

The enablement and support dynamic interconnection links the technology and process elements. It involves creating security policies, guidelines, and standards to support business requirements.

QUESTION 28

Emergence dynamic interconnection of information security business model

ANSWER

The emergence interconnection links the people and process elements. It indicates patterns in an organization's life that appear and grow without any evident reason, and have results that are difficult to forecast and control.

QUESTION 29

Human Factors dynamic interconnection of information security business model

ANSWER

The human factors interconnection links the people and technology elements, and indicates the relationship and gap between these elements.

QUESTION 30

Architecture dynamic interconnection of information security business model

ANSWER

The architecture interconnection links the organization and technology elements. It completely covers an organization's policies, processes, people, and technology that compose the security practices.

QUESTION 31

for the information security strategy to be effective, it should be developed to achieve certain high-level outcomes:

ANSWER

- strategic alignment - risk management - value delivery - resource management - performance measurement - process assurance

QUESTION 32

Which 3 key participants are involved in the development of the information security strategy?

ANSWER

1. The BOD or the senior management 2. the executive management and steering committee 3. the CISO or ISM

QUESTION 33

responsibilities of key participants involved in developing an information security strategy

ANSWER

The senior management ensures that the organization's information security strategy is aligned with its business strategy and objectives. The executive management and steering committee are actively involved in risk management. It involves managing the threats to information assets during strategy implementation. To implement an information security strategy, the CISO and information security managers need to create detailed security action plans. The CISO specifies the security plans to be implemented.

QUESTION 34

In the McKinsey model, to ensure that security initiatives are carefully managed, they need to be:

ANSWER

- distributed equally across the organization's core business activities to manage new challenges - reviewed and updated regularly based on the changes in the business environment, and - directed towards initiating new businesses

QUESTION 35

This model reinforces the importance of analyzing business requirements from a security perspective while developing a security architecture.

ANSWER

SABSA. Sherwood Applied Business Security Architecture.

QUESTION 36

What are the 6 layers of the SABSA model?

ANSWER

- Business View - also called the Contextual Security Architecture - Architect's View - also called the Conceptual Security Architecture - Designer's View - also called the Logical Security Architecture - Builder's View - also called the Physical Security Architecture - Tradesman's View - also called the Component Security Architecture, and - Service Manager's View - also called the Security Service Management Architecture

QUESTION 37

5 steps to develop an information security strategy:

ANSWER

- define the goals and objectives of the security program - create a business case - describe the desired state of the organization's security - determine the current state of the organization's security, and - establish an action plan to move from the current state to the desired state

QUESTION 38

Questions to ask when creating specific goals of information security:

ANSWER

Which resources are vital to the success of your business? Which of them should be confidential? Which are for internal use only? Which should be available for the public? For your goals to answer these key questions, you need to • recognize and track information assets • categorize information assets based on criticality and sensitivity, and • determine the principles and procedures for effectively categorizing, storing, retaining, and removing information assets

QUESTION 39

In terms of developing an information security strategy, what is a business case?

ANSWER

A business case contains your justifications and arguments for implementing a security program. A typical business case should include all the details of the security program such as the cost of implementing it, return on investment, benefits of the program, the actual risk and success factors, and the Total Cost of Ownership, TCO

QUESTION 40

What is the desired state of information security?

ANSWER

The desired state of security depicts all relevant conditions related to an organization's information security that might arise in the future. For example the desired state of security for a recently established IT company would be the establishment of a fully automated security system that protects the company from external threats.

QUESTION 41

What is COBIT 5?

ANSWER

COBIT 5 is an information security governance model that provides a set of processes, agreed measures, and best practices, mainly for the control and governance of information technology. It outlines a set of processes that align IT with the business. It serves as a bridge between business objectives, technology, and control requirements, and ensures maximum benefits from IT.

QUESTION 42

What is the current state of security?

ANSWER

The current state of security, which encompasses people, processes, and technologies, provides the security baseline from where you can implement the roadmap to reach the desired security state. This security baseline also provides the metrics that you can use to measure the progress made in achieving the desired state of security.

QUESTION 43

What is a security roadmap?

ANSWER

A roadmap is a set of actions or steps that you must execute in order to achieve the security strategy objectives. An effective roadmap should close the gaps between the current and desired states of security in your organization.

QUESTION 44

What are some sources used to develop a security strategy?

ANSWER

- policies - guidelines - standards - procedures - training - personnel security - awareness and education - compliance enforcement - audits

QUESTION 45

Of the sources used to develop a security strategy, which are considered the first set of resources used?

ANSWER

Policies Procedures Standards Guidelines

QUESTION 46

Policies

ANSWER

Policies are the foundation of a security strategy. They are high-level statements that embrace the organization's goals and objectives for a specific area. They describe the management's intent and expectations from the security strategy.

QUESTION 47

Procedures

ANSWER

Procedures include step-by-step instructions to carry out a policy. For example, a Password Policy defines how often you need to change your password. A Password Management procedure, on the other hand, lists the procedure to create a new password and the steps to ensure that this is done correctly.

QUESTION 48

Standards

ANSWER

A standard is written in conjunction with a policy. For example, an organization may have a policy defining the use of wireless technology. This policy may be accompanied by a wireless standard that details the specific configuration setup and protocols required for connecting secure networks.

QUESTION 49

Guidelines

ANSWER

Guidelines contain information such as suggestions, dependencies, and examples that clarifies procedures and helps execute these procedures. Guidelines are used as a precursor for what may eventually become a policy issue.

QUESTION 50

Internal Audit

ANSWER

Internal audits evaluate an organization's internal controls and operations. These audits are conducted by a department or a team setup specifically for this purpose. Internal audits support compliance requirements and function as independent risk assessors.

QUESTION 51

External Audits

ANSWER

External audits are often conducted by the Finance department and do not involve information security. However, external audits provide an objective view of the organization's overall security and are often a requirement for most organizations.

QUESTION 52

Strategies for addressing risk

ANSWER

Risk mitigation Risk avoidance Risk transference Risk acceptance

QUESTION 53

Balanced scorecard

ANSWER

The balanced scorecard is most effective for evaluating the degree to which information security objectives are being met. The balanced business scorecard can track the effectiveness of how an organization executes it information security strategy and determine areas of improvement.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials