Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISM Exam Dumps - Certified Information Security Manager

Searching for workable clues to ace the Isaca CISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 97

Which of the following is MOST difficult to measure following an information security breach?

A.

Reputational damage

B.

Human resource costs

C.

Replacement efforts

D.

Regulatory sanctions

Full Access
Question # 98

An organization has decided to implement an Internet of Things (IoT) solution to remain competitive in the market. Which of the following should information security do FIRST?

A.

Recalculate risk profile

B.

Implement compensating controls

C.

Reassess risk tolerance levels

D.

Update the security architecture

Full Access
Question # 99

Which is MOST important to identify when developing an effective information security strategy?

A.

Security awareness training needs

B.

Potential savings resulting from security governance

C.

Business assets to be secured

D.

Residual risk levels

Full Access
Question # 100

Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?

A.

Update the vendor risk assessment.

B.

Engage legal counsel.

C.

Renegotiate the vendor contract.

D.

Terminate the relationship with the vendor.

Full Access
Question # 101

Which of the following is the BEST indication ofa successful information security culture?

A.

Penetration testing is done regularly and findings remediated.

B.

End users know how to identify and report incidents.

C.

Individuals are given roles based on job functions.

D.

The budget allocated for information security is sufficient.

Full Access
Question # 102

Which of the following activities MUST be performed by an information security manager for change requests?

A.

Perform penetration testing on affected systems.

B.

Scan IT systems for operating system vulnerabilities.

C.

Review change in business requirements for information security.

D.

Assess impact on information security risk.

Full Access
Question # 103

Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?

A.

A patch management process

B.

Version control

C.

Change management controls

D.

Logical access controls

Full Access
Question # 104

Which of the following would be MOST helpful to identify worst-case disruption scenarios?

A.

Business impact analysis (BIA)

B.

Business process analysis

C.

SWOT analysis

D.

Cast-benefit analysis

Full Access
Go to page: