Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 177

Which of the following is the BEST way to obtain support for a new organization-wide information security program?

A.

Benchmark against similar industry organizations

B.

Deliver an information security awareness campaign.

C.

Publish an information security RACI chart.

D.

Establish an information security strategy committee.

Full Access
Question # 178

An information security manager developing an incident response plan MUST ensure it includes:

A.

an inventory of critical data.

B.

criteria for escalation.

C.

a business impact analysis (BIA).

D.

critical infrastructure diagrams.

Full Access
Question # 179

Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?

A.

Information security manager

B.

Chief risk officer (CRO)

C.

Information security steering committee

D.

Risk owner

Full Access
Question # 180

Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?

A.

Revise the procurement process.

B.

Update the change management process.

C.

Discuss the issue with senior leadership.

D.

Remove the application from production.

Full Access
Question # 181

Several months after the installation of a new firewall with intrusion prevention features to block malicious activity, a breach was discovered that came in through the firewall shortly after installation. This breach could have been detected earlier by implementing firewall:

A.

packet filtering.

B.

web surfing controls.

C.

log monitoring.

D.

application awareness.

Full Access
Question # 182

Which of the following is an example of a change to the external threat landscape?

A.

The information security program has been outsourced.

B.

A commonly used encryption algorithm has been compromised.

C.

Industry security standards have been modified.

D.

The organization has been purchased by another entity.

Full Access
Question # 183

Which of the following would MOST effectively ensure that a new server is appropriately secured?

A.

Performing secure code reviews

B.

Enforcing technical security standards

C.

Conducting penetration testing

D.

Initiating security scanning

Full Access
Question # 184

Capacity planning would prevent:

A.

file system overload arising from distributed denial of service (DDoS) attacks.

B.

system downtime for scheduled security maintenance.

C.

application failures arising from insufficient hardware resources.

D.

software failures arising from exploitation of buffer capacity vulnerabilities.

Full Access
Go to page: