Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISM Exam Dumps - Certified Information Security Manager

Searching for workable clues to ace the Isaca CISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 105

In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:

A.

evaluate results of the most recent incident response test.

B.

review the number of reported security incidents.

C.

ensure established security metrics are reported.

D.

assess progress of risk mitigation efforts.

Full Access
Question # 106

Reevaluation of risk is MOST critical when there is:

A.

resistance to the implementation of mitigating controls.

B.

a management request for updated security reports.

C.

a change in security policy.

D.

a change in the threat landscape.

Full Access
Question # 107

Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?

A.

To ensure industry best practices for enterprise security are followed

B.

To establish the minimum level of controls needed

C.

To determine the desired state of enterprise security

D.

To satisfy auditors' recommendations for enterprise security

Full Access
Question # 108

Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?

A.

Conduct a business impact analysis (BIA)

B.

Identify the response and recovery learns.

C.

Review the communications plan.

D.

Develop response and recovery strategies.

Full Access
Question # 109

An organization has suffered from a large-scale security event impacting a critical system. Following the decision to restore the system at an alternate location, which plan should be invoked?

A.

Disaster recovery plan (DRP)

B.

Incident response plan

C.

Business continuity plan (BCP)

D.

Communications plan

Full Access
Question # 110

While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?

A.

Assign responsibility to the database administrator (DBA).

B.

Review the databases for sensitive content.

C.

Prepare a report of the databases for senior management.

D.

Assign the highest classification level to those databases.

Full Access
Question # 111

Embedding security responsibilities into job descriptions is important PRIMARILY because it:

A.

supports access management.

B.

simplifies development of the security awareness program.

C.

aligns security to the human resources (HR) function.

D.

strengthens employee accountability.

Full Access
Question # 112

Which of the following is the FIRST step to establishing an effective information security program?

A.

Conduct a compliance review.

B.

Assign accountability.

C.

Perform a business impact analysis (BIA).

D.

Create a business case.

Full Access
Go to page: