Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISM Exam Dumps - Certified Information Security Manager

Searching for workable clues to ace the Isaca CISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 97

Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?

A.

Lack of encryption for backup data in transit

B.

Undefined or undocumented backup retention policies

C.

Ineffective alert configurations for backup operations

D.

Unavailable or corrupt data backups

Full Access
Question # 98

For an e-business that requires high availability, which of the following design principles is BEST?

A.

Manual failover to the website of another e-business that meets the user's needs

B.

A single point of entry allowing transactions to be received and processed quickly

C.

Intelligent middleware to direct transactions from a downed system to an alternative

D.

Availability of an adjacent cold site and a standby server with mirrored copies of critical data

Full Access
Question # 99

An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?

A.

Wipe the affected system.

B.

Notify internal legal counsel.

C.

Notify senior management.

D.

Isolate the impacted endpoints.

Full Access
Question # 100

Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?

A.

Computer forensics

B.

Continuous log monitoring

C.

Root cause analysis

D.

Penetration testing

Full Access
Question # 101

What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?

A.

Developing a dashboard for communicating the metrics

B.

Agreeing on baseline values for the metrics

C.

Benchmarking the expected value of the metrics against industry standards

D.

Aligning the metrics with the organizational culture

Full Access
Question # 102

When establishing an information security governance framework, it is MOST important for an information security manager to understand:

A.

information security best practices.

B.

risk management techniques.

C.

the threat environment.

D.

the corporate culture.

Full Access
Question # 103

Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?

A.

Disconnect the system from the network.

B.

Change passwords on the compromised system.

C.

Restore the system from a known good backup.

D.

Perform operation system hardening.

Full Access
Question # 104

An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:

A.

the security organization structure.

B.

international security standards.

C.

risk assessment results.

D.

the most stringent requirements.

Full Access
Go to page: