Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 185

When developing an information security strategy for an organization, which of the following is MOST helpful for understanding where to focus efforts?

A.

Gap analysis

B.

Project plans

C.

Vulnerability assessment

D.

Business impact analysis (BIA)

Full Access
Question # 186

Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?

A.

To identify the organization's risk tolerance

B.

To improve security processes

C.

To align security roles and responsibilities

D.

To optimize security risk management

Full Access
Question # 187

Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?

A.

Execute a risk treatment plan.

B.

Review contracts and statements of work (SOWs) with vendors.

C.

Implement data regionalization controls.

D.

Determine current and desired state of controls.

Full Access
Question # 188

Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?

A.

Providing ongoing training to the incident response team

B.

Implementing proactive systems monitoring

C.

Implementing a honeypot environment

D.

Updating information security awareness materials

Full Access
Question # 189

Which of the following control types should be considered FIRST for aligning employee behavior with an organization's information security objectives?

A.

Administrative security controls

B.

Technical security controls

C.

Physical security controls

D.

Access security controls

Full Access
Question # 190

An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?

A.

Local regulations

B.

Data backup strategy

C.

Consistency in awareness programs

D.

Organizational reporting structure

Full Access
Question # 191

Which of the following is a PRIMARY function of an incident response team?

A.

To provide effective incident mitigation

B.

To provide a risk assessment for zero-day vulnerabilities

C.

To provide a single point of contact for critical incidents

D.

To provide a business impact analysis (BIA)

Full Access
Question # 192

Which of the following is MOST important to the effectiveness of an information security program?

A.

Security metrics

B.

Organizational culture

C.

IT governance

D.

Risk management

Full Access
Go to page: