100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISM - Risk management & Response questions with correct answers 2024/2025

Rating
-
Sold
-
Pages
38
Grade
A+
Uploaded on
19-08-2024
Written in
2024/2025

CISM - Risk management & Response questions with correct answers 2024/2025

Institution
Risk Management
Course
Risk management











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Risk management
Course
Risk management

Document information

Uploaded on
August 19, 2024
Number of pages
38
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • risk management

Content preview

CISM - Risk management & Response

C is the correct answer.

Justification

File backup procedures ensure the availability of information in alignment with data retention
requirements but do nothing to prevent leakage.

Database integrity checks verify the allocation and structural integrity of all the objects in the
specified database but do nothing to prevent leakage.

An acceptable use policy establishes an agreement between users and the enterprise and
defines for all parties the ranges of use that are approved before gaining access to a
network or the Internet.

Incident response procedures provide detailed steps that help an organization minimize the
impact of an adverse event and do not directly address data leakage. - ANSWhich of the
following would BEST address the risk of data leakage?

File backup procedures

Database integrity checks

Acceptable use policies

Incident response procedures

B is the correct answer.

Justification

Risk assessment includes identification and analysis to determine the likelihood and
potential consequences of a compromise, which is not when risk is to be considered for
acceptance or requires mitigation.

If after risk evaluation a risk is unacceptable, acceptability is determined after risk mitigation
efforts.

Risk identification is the process during assessment during which viable risk is identified
through developing a series of potential risk scenarios.

Monitoring is unrelated to risk acceptance. - ANSRisk acceptance is a component of which
of the following?

,Risk assessment

Risk treatment

Risk identification

Risk monitoring

C is the correct answer.

Justification

Only after data are determined critical to the organization can a data leak prevention
program be properly implemented.

User awareness training can be helpful but only after data have been classified.

Information classification must be conducted first.

Network intrusion detection is a technology that can support the data leak prevention
program, but it is not a primary consideration. - ANSIn controlling information leakage,
management should FIRST establish:

a data leak prevention program.

user awareness training.

an information classification process.

a network intrusion detection system.

D is the correct answer.

Justification

A gap analysis is not as appropriate for evaluating a business impact analysis.

A gap analysis is not as appropriate for developing a business balanced scorecard.

A gap analysis is not as appropriate for evaluating demonstrating the relationship between
controls.

A gap analysis is most useful in addressing the differences between the current state and
future state. - ANSWhich of the following is the MOST appropriate use of gap analysis?

Evaluating a business impact analysis

Developing a balanced business scorecard

,Demonstrating the relationship between controls

Measuring current state versus desired future state

A is the correct answer.

Justification

Organizational requirements should determine when a risk has been reduced to an
acceptable level.

The acceptability of a risk is ultimately a management decision, which may or may not be
consistent with information systems requirements.

The acceptability of a risk is ultimately a management decision, which may or may not be
consistent with information security requirements.

Because each organization is unique, international standards may not represent the best
solution for specific organizations and are primarily a guideline. - ANSThe decision as to
whether an IT risk has been reduced to an acceptable level should be determined by:

organizational requirements.

information systems requirements.

information security requirements.

international standards.

A is the correct answer.

Justification

Role-based access control is a preventive control that provides access according to
business needs; therefore, it reduces unnecessary access rights and enforces
accountability.

Audit trail monitoring is a detective control, which is "after the fact."

Privacy policy is not relevant to this risk.

Defense in depth primarily focuses on external threats and control layering. - ANSWhich of
the following measures would be MOST effective against insider threats to confidential
information?

Role-based access control

, Audit trail monitoring

Privacy policy

Defense in depth

C is the correct answer.

Justification

The fact that overall risk has been quantified does not necessarily indicate the existence of a
successful risk management practice.

Eliminating inherent risk is virtually impossible.

A successful risk management practice reduces residual risk to acceptable levels.

Although the tying of control risk to business may improve accountability, this is not as
desirable as achieving acceptable residual risk levels. - ANSWhich of the following BEST
indicates a successful risk management practice?

Overall risk is quantified.

Inherent risk is eliminated.

Residual risk is minimized.

Control risk is tied to business units.

D is the correct answer.

Justification

Inherent risk may already be acceptable and require no remediation. Minimizing below the
acceptable level is not the objective and usually raises costs.

Elimination of business risk is not possible.

Effective controls are naturally a clear objective of a risk management program to the extent
of achieving the primary goal of achieving acceptable risk across the organization.

The goal of a risk management program is to ensure that acceptable risk levels are achieved
and maintained. - ANSWhat is the PRIMARY objective of a risk management program?

Minimize inherent risk.

Eliminate business risk.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Qualityexam Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
63
Member since
1 year
Number of followers
2
Documents
1104
Last sold
3 days ago

Welcome To my Store My Goal is to help you achieve your desired grades by providing credible study materials I'm happy to help you with quality documents On this page you will find quality study guides,Exams assignments, Research papers and Test Banks all verified correct . you'll find past and recent revised and verified study materials . Stay here and You'll find everything you need to pass !!! . I always ensure my documents are of high standards Be assured to get good grades and always leave a review after a purchase Refer a friend SUCCESS!!!!

Read more Read less
4.1

15 reviews

5
9
4
1
3
3
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions