Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 137

Which of the following should be the PRIMARY outcome of an information security program?

A.

Strategic alignment

B.

Risk elimination

C.

Cost reduction

D.

Threat reduction

Full Access
Question # 138

Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?

A.

Impose state limits on servers.

B.

Spread a site across multiple ISPs.

C.

Block the attack at the source.

D.

Harden network security.

Full Access
Question # 139

Which of the following is MOST difficult to measure following an information security breach?

A.

Reputational damage

B.

Human resource costs

C.

Regulatory sanctions

D.

Replacement efforts

Full Access
Question # 140

A balanced scorecard MOST effectively enables information security:

A.

project management

B.

governance.

C.

performance.

D.

risk management.

Full Access
Question # 141

Which of the following should be the PRIMARY focus for an information security manager when reviewing access controls for data stored in an off-premise cloud environment?

A.

Reviewing and updating access controls in response to changes in organizational structure

B.

Implementing strong password policies and enforcing regular password changes

C.

Ensuring access is granted to only those individuals whose job functions require it

D.

Implementing strong encryption protocols to protect sensitive data

Full Access
Question # 142

Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?

A.

Alignment with financial reporting

B.

Alignment with business initiatives

C.

Alignment with industry frameworks

D.

Alignment with risk appetite

Full Access
Question # 143

An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?

A.

Scan the entire application using a vulnerability scanning tool.

B.

Run the application from a high-privileged account on a test system.

C.

Perform security code reviews on the entire application.

D.

Monitor Internet traffic for sensitive information leakage.

Full Access
Question # 144

An organization is increasingly using Software as a Service (SaaS) to replace in-house hosting and support of IT applications. Which of the following would be the MOST effective way to help ensure procurement decisions consider information security concerns?

A.

Integrate information security risk assessments into the procurement process.

B.

Provide regular information security training to the procurement team.

C.

Invite IT members into regular procurement team meetings to influence best practice.

D.

Enforce the right to audit in procurement contracts with SaaS vendors.

Full Access
Go to page: