Cism Notes 2024
Cism Notes 2024
Exam Questions
4 hours (240 minutes), 150 multiple choice questions
200 – 450 Pass – 800
1.6 minutes per question
Every question has a stem (question) and four options
(answer choices).
Choose the correct or best answer from the options.
The stem may be in the form of a question or
incomplete statement.
An exam question may require you to choose the
appropriate answer based on a qualifier, such as FIRST,
MOST likely or BEST. So, there might be two right
answers, so pick the BEST option.
Read the question carefully, eliminate known incorrect
answers and then make the best choice
possible.
Answers questions from a Business Risk perspective,
rather than technical solution or control.
Domain 1: Information Security Governance
CIA Triad
The three main goals of information security are:
Gap Analysis
A gap analysis compares the current state of security controls
to a benchmark and identifies any areas of deviation.
Security Frameworks
Security frameworks provide templates for security
activities. These include COBIT, NIST CSF, and ISO 27001/2.
Due Care and Due Diligence
Due care is taking reasonable steps to protect the interest of the
organisation. Due diligence ensures those steps are carried
out.
Security Governance
Security governance is carried out through
Policies which state high-level objectives (mandatory
compliance).
Standards which state detailed technical requirements
(mandatory compliance).
Procedures which provide step-by-step processes
(mandatory compliance).
Guidelines which offer advice and best practices
(optional compliance).
For the security policy framework to be successful, it must have
the support of senior leadership and other stakeholders.
Security Strategy
Security is a constant balancing act
between usability and control. Managers must constantly
make trade-offs to allow the organization to achieve both
security and business objectives.
Every organization has a risk tolerance (or risk appetite)
that describes how much risk the organization is willing to
accept. Understanding this tolerance, whether it is explicit or
implicit, is crucial to finding the correct balance for security
activities.
Key influences on security strategy include:
Business environment
Emerging technologies
Social media
Regulatory requirements
Threat landscape
Security baselines, such as NIST SP 800-53, provide a
standardized set of controls that an organization may use as a
benchmark.
Disaster recovery plans require testing. There are five major test
types:
Two serious issues can occur when users are granted limited
access to information in databases or other repositories.
Aggregation attacks occur when a user is able to summarize
individual records to detect trends that are confidential.
Inference attacks occur when a user is able to use several
innocuous facts in combination to determine, or infer, more
sensitive information.
The implicit deny principle says that any action that is not
explicitly authorized for a subject should be denied.
1. Injection attacks
2. Broken authentication
3. Sensitive data exposure
4. XML external entities
5. Broken access control
6. Security misconfiguration
7. Cross-site scripting
8. Insecure deserialization
9. Using components with known vulnerabilities.
10. Insufficient logging and monitoring
In addition to maintaining current and patched platforms, one of
the most effective application security techniques is input
validation which ensures that user input matches the expected
pattern before using it in code.
Cyber Investigations
Security professionals are often called upon to participate in a
variety of investigations:
Criminal investigations look into the violation of a
criminal law and use the beyond a reasonable doubt
standard of proof.
Civil investigations examine potential violations of civil
law and use the preponderance of the evidence
standard.
Regulatory investigations examine the violation of a
private or public regulatory standard.
Administrative investigations are internal to an
organization, supporting administrative activities.
Evidence
Investigations may use several different types of evidence:
Reference
CISA 1.6 – What is a Risk Based Audit Approach?
– https://lnkd.in/eseF7Ymv
CISA 1.5 – What are IS Controls?
– https://lnkd.in/eseF7Ymv
CISA 1.4 – What is the difference between a Control and
a Control Objective? – https://lnkd.in/ehYhedRM
CISA 1.3 – What are the 4 types of controls?
– https://lnkd.in/ek9YAXDK
CISA 1.2 – Everything You Need to Know about Internal
Audit Function – https://lnkd.in/ekeVV9fv
CISA 1.1 – What is IT Audit? – https://lnkd.in/ehigUK7S
COBIT 2019 Foundation – Chapter 1: Course Overview –
https://youtube.com/playlist?
list=PL73WzVfh2gWmTod3RIdDCWSm_Xw9Ps_4W
PMP
ITIL
Cybook – https://www.cybok.org/knowledgebase1_1/
Exam Questions
Explanation:
Prior to assessing technical vulnerabilities or levels of security
awareness, an information security manager needs to gain an
understanding of the current business strategy and direction. A
business impact analysis should be performed prior to
developing a business continuity plan, but this would not be an
appropriate first step in developing an information security
strategy because it focuses on availability.