Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISM Exam Dumps - Certified Information Security Manager

Searching for workable clues to ace the Isaca CISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 81

An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:

A.

conduct an incident forensic analysis.

B.

fallow the incident response plan

C.

notify the business process owner.

D.

fallow the business continuity plan (BCP).

Full Access
Question # 82

Which of the following is the PRIMARY reason to assign a risk owner in an organization?

A.

To remediate residual risk

B.

To define responsibilities

C.

To ensure accountability

D.

To identify emerging risk

Full Access
Question # 83

Which of the following is MOST important when defining how an information security budget should be allocated?

A.

Regulatory compliance standards

B.

Information security strategy

C.

Information security policy

D.

Business impact assessment

Full Access
Question # 84

A recent audit found that an organization's new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?

A.

Automated controls

B.

Security policies

C.

Guidelines

D.

Standards

Full Access
Question # 85

When investigating an information security incident, details of the incident should be shared:

A.

widely to demonstrate positive intent.

B.

only with management.

C.

only as needed,

D.

only with internal audit.

Full Access
Question # 86

Which of the following would provide the BEST evidence to senior management that security control performance has improved?

A.

Demonstrated return on security investment

B.

Reduction in inherent risk

C.

Results of an emerging threat analysis

D.

Review of security metrics trends

Full Access
Question # 87

Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?

A.

Requiring an external security audit of the IT service provider

B.

Requiring regular reporting from the IT service provider

C.

Defining information security requirements with internal IT

D.

Defining the business recovery plan with the IT service provider

Full Access
Question # 88

Which of the following should an information security manager do FIRST upon learning that a competitor has experienced a ransomware attack?

A.

Perform a full data backup.

B.

Conduct ransomware awareness training for all staff.

C.

Update indicators of compromise in the security systems.

D.

Review the current risk assessment.

Full Access
Go to page: