Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 97

A balanced scorecard MOST effectively enables information security:

A.

risk management

B.

project management

C.

governance

D.

performance

Full Access
Question # 98

Which of the following elements of a service contract would BEST enable an organization to monitor the information security risk associated with a cloud service provider?

A.

Indemnification clause

B.

Breach detection and notification

C.

Compliance status reporting

D.

Physical access to service provider premises

Full Access
Question # 99

Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?

A.

To alert on unacceptable risk

B.

To identify residual risk

C.

To reassess risk appetite

D.

To benchmark control performance

Full Access
Question # 100

The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:

A.

cause fewer potential production issues.

B.

require less IT staff preparation.

C.

simulate real-world attacks.

D.

identify more threats.

Full Access
Question # 101

To help ensure that an information security training program is MOST effective its contents should be

A.

focused on information security policy.

B.

aligned to business processes

C.

based on employees' roles

D.

based on recent incidents

Full Access
Question # 102

An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?

A.

Internal IT audit

B.

The data custodian

C.

The information security manager

D.

The data owner

Full Access
Question # 103

Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?

A.

Senior management

B.

Application owner

C.

Information security manager

D.

Legal representative

Full Access
Question # 104

What type of control is being implemented when a security information and event management (SIEM) system is installed?

A.

Preventive

B.

Deterrent

C.

Detective

D.

Corrective

Full Access
Go to page: