Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 161

An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?

A.

Wipe the affected system.

B.

Notify internal legal counsel.

C.

Notify senior management.

D.

Isolate the impacted endpoints.

Full Access
Question # 162

While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?

A.

The test is scheduled to reduce operational impact.

B.

The test involves IT members in the test process.

C.

The test addresses the critical components.

D.

The test simulates actual prime-time processing conditions.

Full Access
Question # 163

Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?

A.

Focus on addressing conflicts between security and performance.

B.

Collaborate with business and IT functions in determining controls.

C.

Include information security requirements in the change control process.

D.

Obtain assistance from IT to implement automated security cantrals.

Full Access
Question # 164

An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?

A.

Operations manager

B.

Service owner

C.

Information security manager

D.

Incident response team

Full Access
Question # 165

When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?

A.

Business impact analysis (BIA) results

B.

Vulnerability assessment results

C.

The business continuity plan (BCP)

D.

Recommendations from senior management

Full Access
Question # 166

Embedding security responsibilities into job descriptions is important PRIMARILY because it:

A.

supports access management.

B.

simplifies development of the security awareness program.

C.

aligns security to the human resources (HR) function.

D.

strengthens employee accountability.

Full Access
Question # 167

An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?

A.

Conduct a risk assessment.

B.

Communicate the changes to stakeholders.

C.

Update the organization's risk register.

D.

Develop a policy exception process.

Full Access
Question # 168

The PRIMARY reason to properly classify information assets is to determine:

A.

appropriate encryption strength using a risk-based approach.

B.

the business impact if assets are compromised.

C.

the appropriate protection based on sensitivity.

D.

user access levels based on the need to know.

Full Access
Go to page: