Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 113

Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?

A.

Enhanced data governance

B.

Increased third-party assurance

C.

)Improved incident management

D.

Reduced total cost of ownership (TCO)

Full Access
Question # 114

Which of the following will ensure confidentiality of content when accessing an email system over the Internet?

A.

Multi-factor authentication

B.

Digital encryption

C.

Data masking

D.

Digital signatures

Full Access
Question # 115

A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?

A.

Update in accordance with the best business practices.

B.

Perform a risk assessment of the current IT environment.

C.

Gain an understanding of the current business direction.

D.

Inventory and review current security policies.

Full Access
Question # 116

Which of the following would be the BEST way to reduce the risk of disruption resulting from an emergency system change?

A.

Confirm the change implementation is scheduled.

B.

Verify the change request has been approved.

C.

Confirm rollback plans are in place.

D.

Notify users affected by the change.

Full Access
Question # 117

An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?

A.

Conduct a risk assessment and share the result with senior management.

B.

Revise the incident response plan-to align with business processes.

C.

Provide incident response training to data custodians.

D.

Provide incident response training to data owners.

Full Access
Question # 118

Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?

A.

Projected Increase in maturity level

B.

Estimated reduction in risk

C.

Projected costs over time

D.

Estimated increase in efficiency

Full Access
Question # 119

An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?

A.

The information security manager

B.

The data owner

C.

The application owner

D.

The security engineer

Full Access
Question # 120

An online trading company discovers that a network attack has penetrated the firewall. What should be the information security manager's FIRST response?

A.

Notify the regulatory agency of the incident.

B.

Implement mitigating controls.

C.

Evaluate the impact to the business.

D.

Examine firewall logs to identify the attacker.

Full Access
Go to page: