Domain 3 Capstone Review: Information Security Program
This capstone integrates:
- Program Development
- Control Design & Implementation
- Control Testing & Evaluation
- Awareness & Training
- External Service Management
- Program Communications
Think governance. Think sustainability. Think proportionality.
Question 1
A security program invests heavily in advanced monitoring tools but lacks documented procedures.
What is the PRIMARY weakness?
- Process immaturity
- Encryption gap
- Vendor inefficiency
- Reduced automation
Answer & Explanation
Correct Answer: A
Technology without defined process undermines program maturity.
Question 2
Sensitive data is stored across multiple platforms without classification.
What should occur FIRST?
- Encrypt all data
- Conduct formal asset identification and classification
- Increase monitoring
- Replace storage vendors
Answer & Explanation
Correct Answer: B
Classification drives proportional protection.
Question 3
A complex framework is adopted despite limited staff capacity.
What is the MOST significant risk?
- Over-compliance
- Encryption downgrade
- Vendor inefficiency
- Implementation failure due to resource mismatch
Answer & Explanation
Correct Answer: D
Framework adoption must align with organizational maturity.
Question 4
A preventive control disrupts operations significantly while mitigating moderate risk within tolerance.
What is the MOST appropriate response?
- Maintain the control regardless
- Eliminate the business function
- Reevaluate proportionality and alternative control options
- Accept the risk automatically
Answer & Explanation
Correct Answer: C
Controls must align with risk appetite and operational feasibility.
Question 5
A control is implemented without change management approval.
What governance issue arises?
- Breakdown in structured implementation discipline
- Encryption gap
- Vendor inefficiency
- Monitoring delay
Answer & Explanation
Correct Answer: A
Control implementation must follow formal governance processes.
Question 6
High-risk controls are not tested regularly.
What is the PRIMARY concern?
- Over-monitoring
- Unvalidated operating effectiveness
- Vendor inefficiency
- Reduced automation
Answer & Explanation
Correct Answer: B
High-risk controls require periodic validation.
Question 7
Training completion rates are high, but policy violations continue.
What is the MOST appropriate improvement?
- Increase training frequency
- Eliminate training requirement
- Replace IT systems
- Implement role-based training and measure behavior outcomes
Answer & Explanation
Correct Answer: D
Effectiveness must be measured beyond attendance.
Question 8
A vendor processes critical data but lacks contractual incident notification timelines.
What is the PRIMARY weakness?
- Encryption gap
- Monitoring deficiency
- Inadequate contractual governance
- Vendor inefficiency
Answer & Explanation
Correct Answer: C
Contracts enforce security expectations.
Question 9
Board reporting includes detailed firewall configurations.
What is the PRIMARY issue?
- Lack of business-aligned communication
- Excess transparency
- Encryption weakness
- Vendor oversight
Answer & Explanation
Correct Answer: A
Board reporting must focus on enterprise risk posture.
Question 10
Repeated audit findings show access review failures.
What should occur FIRST?
- Replace access system
- Conduct root cause analysis and remediation tracking
- Increase monitoring tools
- Ignore minor issues
Answer & Explanation
Correct Answer: B
Repeated findings indicate systemic control weakness.
Question 11
Security roles overlap with unclear accountability.
What is the PRIMARY program risk?
- Encryption gap
- Vendor inefficiency
- Reduced automation
- Governance breakdown due to undefined responsibilities
Answer & Explanation
Correct Answer: D
Clear roles are foundational to program effectiveness.
Question 12
A security metric tracks vulnerability volume but not business impact.
What is missing?
- Increased scanning
- Encryption controls
- Outcome-based risk alignment
- Vendor reporting
Answer & Explanation
Correct Answer: C
Metrics must demonstrate enterprise risk posture.
Question 13
A control conflicts with existing architecture after deployment.
What should have occurred FIRST?
- Conduct integration and compatibility assessment
- Increase automation
- Replace infrastructure
- Ignore conflict
Answer & Explanation
Correct Answer: A
Integration planning prevents operational disruption.
Question 14
Asset classification is outdated after major digital expansion.
What is the PRIMARY risk?
- Reduced automation
- Misaligned control protection
- Vendor inefficiency
- Monitoring delay
Answer & Explanation
Correct Answer: B
Classification must evolve with business changes.
Question 15
A third-party vendor uses subcontractors without visibility.
What is the MOST appropriate action?
- Ignore subcontractors
- Replace vendor immediately
- Increase internal encryption
- Assess fourth-party exposure and enforce contractual safeguards
Answer & Explanation
Correct Answer: D
Fourth-party oversight is part of vendor governance.
Question 16
Security reports show declining incident detection rates but no analysis.
What is the PRIMARY gap?
- Reduced automation
- Encryption weakness
- Lack of trend interpretation and governance insight
- Vendor inefficiency
Answer & Explanation
Correct Answer: C
Metrics require interpretation and context.
Question 17
A high-risk control is tested less frequently than low-risk controls.
What is the PRIMARY issue?
- Misaligned testing frequency relative to risk
- Over-testing
- Encryption gap
- Vendor inefficiency
Answer & Explanation
Correct Answer: A
Testing must reflect risk exposure.
Question 18
A security policy exists but lacks enforcement mechanisms.
What is the PRIMARY weakness?
- Encryption gap
- Governance authority without operational support
- Monitoring delay
- Vendor inefficiency
Answer & Explanation
Correct Answer: B
Policies must be enforceable to be effective.
Question 19
An awareness program is not updated despite new AI-based phishing techniques.
What is the PRIMARY risk?
- Reduced automation
- Encryption deficiency
- Vendor oversight
- Misalignment between training and threat landscape
Answer & Explanation
Correct Answer: D
Training must evolve with emerging threats.
Question 20
A control reduces risk significantly but has no assigned owner.
What is the MOST significant risk?
- Encryption failure
- Vendor delay
- Lack of accountability for ongoing effectiveness
- Increased automation
Answer & Explanation
Correct Answer: C
Control ownership ensures sustainability.
Question 21
Security expands tooling without increasing staff capacity.
What is the PRIMARY long-term risk?
- Unsustainable program maturity
- Encryption gap
- Vendor inefficiency
- Monitoring delay
Answer & Explanation
Correct Answer: A
Program growth must align with resource capacity.
Question 22
Executive leadership is unaware of rising vendor risk exposure.
What is the PRIMARY governance failure?
- Encryption weakness
- Inadequate reporting and escalation
- Vendor inefficiency
- Reduced automation
Answer & Explanation
Correct Answer: B
Program communication ensures governance visibility.
Question 23
A mitigation control was selected without evaluating cost-benefit impact.
What principle was violated?
- Automation requirement
- Vendor governance
- Monitoring frequency
- Proportional control design
Answer & Explanation
Correct Answer: D
Controls must be economically and operationally rational.
Question 24
Repeated control failures are identified but not tracked for remediation.
What is the PRIMARY issue?
- Encryption gap
- Vendor oversight
- Lack of remediation governance process
- Monitoring delay
Answer & Explanation
Correct Answer: C
Findings must be tracked and resolved formally.
Question 25
A mature security program must demonstrate sustainability. What is MOST critical?
- Balanced alignment of people, process, and technology
- Advanced tools
- Increased vulnerability scanning
- Vendor certification
Answer & Explanation
Correct Answer: A
Long-term maturity requires balanced resource alignment.
Domain 3 Executive Pattern Summary
In Domain 3:
- Design controls proportionally.
- Implement through governance.
- Test regularly.
- Train strategically.
- Monitor vendors continuously.
- Communicate in business language.
- Balance people, process, and technology.
CISM rewards sustainable program leadership — not technical intensity.