Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 145

When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?

A.

Risk owner

B.

Control owner

C.

Business system owner

D.

Application owner

Full Access
Question # 146

A new type of ransomware has infected an organization's network. Which of the following would have BEST enabled the organization to detect this situation?

A.

Regular review of the threat landscape

B.

Periodic information security training for end users

C.

Use of integrated patch deployment tools

D.

Monitoring of anomalies in system behavior

Full Access
Question # 147

Which of the following should be the PRIMARY outcome of an information security program?

A.

Strategic alignment

B.

Risk elimination

C.

Cost reduction

D.

Threat reduction

Full Access
Question # 148

Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?

A.

Execute a risk treatment plan.

B.

Review contracts and statements of work (SOWs) with vendors.

C.

Implement data regionalization controls.

D.

Determine current and desired state of controls.

Full Access
Question # 149

What is the MOST important consideration for an organization operating in a highly regulated market when new regulatory requirements with high impact to the business need to be implemented?

A.

Engaging an external audit

B.

Establishing compensating controls

C.

Enforcing strong monitoring controls

D.

Conducting a gap analysis

Full Access
Question # 150

A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?

A.

Update in accordance with the best business practices.

B.

Perform a risk assessment of the current IT environment.

C.

Gain an understanding of the current business direction.

D.

Inventory and review current security policies.

Full Access
Question # 151

An organization that conducts business globally is planning to utilize a third-party service provider to process payroll information. Which of the following issues poses the GREATEST risk to the organization?

A.

The third party does not have an independent assessment of controls available for review.

B.

The third party has not provided evidence of compliance with local regulations where data is generated.

C.

The third-party contract does not include an indemnity clause for compensation in the event of a breach.

D.

The third party's service level agreement (SLA) does not include guarantees of uptime.

Full Access
Question # 152

Which of the following is the FIRST step in developing a business continuity plan (BCP)?

A.

Determine the business recovery strategy

B.

Determine available resources.

C.

Identify the applications with the shortest recovery time objectives (RTOs).

D.

Identify critical business processes.

Full Access
Go to page: