Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISM Exam Dumps - Certified Information Security Manager

Searching for workable clues to ace the Isaca CISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 169

Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?

A.

Collect additional metrics.

B.

Perform a cost-benefit analysis.

C.

Submit funding request to senior management.

D.

Begin due diligence on the outsourcing company.

Full Access
Question # 170

Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?

A.

Ensuring the continued resilience and security of IT services

B.

Decreasing the percentage of security deployments that cause failures in production

C.

Reducing the number of control assessments to optimize resources

D.

Identifying and addressing security team performance issues

Full Access
Question # 171

A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?

A.

Instruct the vendor to conduct penetration testing.

B.

Suspend the connection to the application in the firewall

C.

Report the situation to the business owner of the application.

D.

Initiate the organization's incident response process.

Full Access
Question # 172

Which of the following is MOST important for guiding the development and management of a comprehensive information security program?

A.

Adopting information security program management best practices

B.

Implementing policies and procedures to address the information security strategy

C.

Aligning the organization's business objectives with IT objectives

D.

Establishing and maintaining an information security governance framework

Full Access
Question # 173

Which of the following is the MOST important consideration when developing an approach to effectively contain security incidents?

A.

Isolating systems impacted by incidents from the production environment

B.

Mitigating reputational damage that may affect business

C.

Minimizing financial losses that may result from outages

D.

Assigning senior management accountability for incident containment

Full Access
Question # 174

Which of the following should be an information security manager's PRIMARY concern when an organization is expanding business to a new country?

A.

Compliance with local regulations

B.

Changes in IT infrastructure

C.

Cultural differences in the new country

D.

Ability to gather customer data

Full Access
Question # 175

Management has expressed concerns to the information security manager that shadow IT may be a risk to the organization. What is the FIRST step the information security manager should take?

A.

Determine the extent of shadow IT usage

B.

Update the security policy to address shadow IT

C.

Block the end user’s ability to use shadow IT

D.

Determine the value of shadow IT projects

Full Access
Question # 176

Which of the following is MOST important for the improvement of a business continuity plan (BCP)?

A.

Incorporating lessons learned

B.

Implementing an IT resilience solution

C.

Implementing management reviews

D.

Documenting critical business processes

Full Access
Go to page: