Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 177

A technical vulnerability assessment on a personnel information management server should be performed when:

A.

the data owner leaves the organization unexpectedly.

B.

changes are made to the system configuration.

C.

the number of unauthorized access attempts increases.

D.

an unexpected server outage has occurred.

Full Access
Question # 178

Which of the following BEST describes a buffer overflow?

A.

A function is carried out with more data than the function can handle

B.

A program contains a hidden and unintended function that presents a security risk

C.

Malicious code designed to interfere with normal operations

D.

A type of covert channel that captures data

Full Access
Question # 179

An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:

A.

the security organization structure.

B.

international security standards.

C.

risk assessment results.

D.

the most stringent requirements.

Full Access
Question # 180

A global organization is considering its geopolitical security risks. Which of the following is the information security manager's BEST approach?

A.

Seek advice from environmental and physical security experts

B.

Implement a third-party risk management framework

C.

Implement controls that deny access from specific jurisdictions

D.

Seek advice from enterprise risk and legal experts

Full Access
Question # 181

Which of the following is MOST important when conducting a forensic investigation?

A.

Analyzing system memory

B.

Documenting analysis steps

C.

Capturing full system images

D.

Maintaining a chain of custody

Full Access
Question # 182

Which of the following is the MOST important input to the development of an effective information security strategy?

A.

Risk and business impact assessments

B.

Business processes and requirements

C.

Current and desired state of security

D.

Well-defined security policies and procedures

Full Access
Question # 183

An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?

A.

Establish an organization-wide social media policy.

B.

Develop sanctions for misuse of social media sites.

C.

Monitor social media sites visited by employees.

D.

Restrict social media access on corporate devices.

Full Access
Question # 184

Which of the following has the GREATEST impact on the ability to successfully execute a disaster recovery plan (DRP)?

A.

Conducting tabletop exercises of the plan

B.

Updating the plan periodically

C.

Communicating the plan to all stakeholders

D.

Reviewing escalation procedures

Full Access
Go to page: