Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 105

When integrating security risk management into an organization it is MOST important to ensure:

A.

business units approve the risk management methodology.

B.

the risk treatment process is defined.

C.

information security policies are documented and understood.

D.

the risk management methodology follows an established framework.

Full Access
Question # 106

Which of the following is the BEST indication of an effective disaster recovery planning process?

A.

Hot sites are required for any declared disaster.

B.

Chain of custody is maintained throughout the disaster recovery process.

C.

Post-incident reviews are conducted after each event.

D.

Recovery time objectives (RTOs) are shorter than recovery point objectives (RPOs).

Full Access
Question # 107

What type of control is being implemented when a security information and event management (SIEM) system is installed?

A.

Preventive

B.

Deterrent

C.

Detective

D.

Corrective

Full Access
Question # 108

Which of the following is MOST important for an information security manager to consider when reviewing a security investment plan?

A.

The plan has summarized IT costs for implementation.

B.

The plan resolves all potential threats to business processes.

C.

The plan focuses on meeting industry best practices and industry standards.

D.

The plan is based on a review of threats and vulnerabilities.

Full Access
Question # 109

Which of the following is the BEST way to obtain organization-wide support for an information security program?

A.

Mandate regular security awareness training.

B.

Develop security performance metrics.

C.

Position security as a business enabler.

D.

Prioritize security initiatives based on IT strategy.

Full Access
Question # 110

What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?

A.

Identify the data to be hosted.

B.

Perform a gap analysis.

C.

Perform a risk assessment.

D.

Analyze the business requirements.

Full Access
Question # 111

Which of the following is necessary to ensure consistent protection for an organization's information assets?

A.

Classification model

B.

Control assessment

C.

Data ownership

D.

Regulatory requirements

Full Access
Question # 112

The PRIMARY objective of performing a post-incident review is to:

A.

re-evaluate the impact of incidents.

B.

identify vulnerabilities.

C.

identify control improvements.

D.

identify the root cause.

Full Access
Go to page: