Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 9

Which of the following should be the NEXT step after a security incident has been reported?

A.

Recovery

B.

Investigation

C.

Escalation

D.

Containment

Full Access
Question # 10

When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?

A.

Configuration management

B.

Risk management

C.

Access control management

D.

Change management

Full Access
Question # 11

Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?

A.

Decrease in false positives

B.

Increase in false positives

C.

Increase in false negatives

D.

Decrease in false negatives

Full Access
Question # 12

An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?

A.

Security requirements are included in the vendor contract

B.

External security audit results are reviewed.

C.

Service level agreements (SLAs) meet operational standards.

D.

Business continuity contingency planning is provided

Full Access
Question # 13

Which of the following BEST demonstrates that an anti-phishing campaign is effective?

A.

Improved staff attendance in awareness sessions

B.

Decreased number of phishing emails received

C.

Improved feedback on the anti-phishing campaign

D.

Decreased number of incidents that have occurred

Full Access
Question # 14

An organization is in the process of defining policies for employee use of social media. It is MOST important for the information security manager to:

A.

Assign accountability for monitoring social media

B.

Identify security monitoring tools

C.

Evaluate risks to the organization

D.

Develop security awareness training

Full Access
Question # 15

Which of the following would provide the MOST effective security outcome in an organizations contract management process?

A.

Performing vendor security benchmark analyses at the request-for-proposal (RFP) stage

B.

Ensuring security requirements are defined at the request-for-proposal (RFP) stage

C.

Extending security assessment to cover asset disposal on contract termination

D.

Extending security assessment to include random penetration testing

Full Access
Question # 16

Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?

A.

Revisit the business objective.

B.

Escalate to senior management.

C.

Perform a cost-benefit analysis.

D.

Recommend risk acceptance.

Full Access
Go to page: