Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 9

A global organization is developing an incident response team. The organization wants to keep headquarters informed of all incidents and wants to be able to present a unified response to widely dispersed events. Which of the following BEST supports these objectives?

A.

Virtual incident response team

B.

Distributed incident response team

C.

Outsourced incident response team

D.

Centralized incident response team

Full Access
Question # 10

Which of the following BEST enables the integration of information security governance into corporate governance?

A.

Well-decumented information security policies and standards

B.

An information security steering committee with business representation

C.

Clear lines of authority across the organization

D.

Senior management approval of the information security strategy

Full Access
Question # 11

Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?

A.

Follow the escalation process.

B.

Identify the indicators of compromise.

C.

Notify law enforcement.

D.

Contact forensic investigators.

Full Access
Question # 12

Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?

A.

Residual risk

B.

Regulatory requirements

C.

Risk tolerance

D.

Control objectives

Full Access
Question # 13

An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?

A.

Perform a vulnerability assessment

B.

Conduct an internal audit

C.

Conduct penetration testing

D.

Prepare compensating controls

Full Access
Question # 14

Which of the following BEST helps to ensure a third-party backup site continues to meet the organization’s information security standards?

A.

Service level agreement (SLA)

B.

Memorandum of understanding (MoU)

C.

Business continuity plan (BCP)

D.

Disaster recovery plan (DRP)

Full Access
Question # 15

An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?

A.

Instruct IT to deploy controls based on urgent business needs.

B.

Present a business case for additional controls to senior management.

C.

Solicit bids for compensating control products.

D.

Recommend a different application.

Full Access
Question # 16

A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?

A.

Information security manager

B.

Security policy author

C.

Creator of the document

D.

Data custodian

Full Access
Go to page: