Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 193

An incident response policy should include:

A.

A description of testing methodology.

B.

Notification requirements.

C.

An infrastructure diagram.

D.

Recovery time objectives (RTOs).

Full Access
Question # 194

Who is accountable for approving an information security governance framework?

A.

The board of directors

B.

The chief information security officer (ClSO)

C.

The enterprise risk committee

D.

The chief information officer (CIO)

Full Access
Question # 195

Which of the following should be the FIRST consideration when developing a strategy for protecting an organization's data?

A.

Classification

B.

Encryption

C.

Access monitoring

D.

Access rights

Full Access
Question # 196

An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?

A.

Definition of when a disaster should be declared

B.

Requirements for regularly testing backups

C.

Recovery time objectives (RTOs)

D.

The disaster recovery communication plan

Full Access
Question # 197

Which of the following presents the GREATEST challenge to a large multinational organization using an automated identity and access management (1AM) system?

A.

Staff turnover rates that significantly exceed industry averages

B.

Large number of applications in the organization

C.

Inaccurate workforce data from human resources (HR)

D.

Frequent changes to user roles during employment

Full Access
Question # 198

Which of the following is MOST important to convey to employees in building a security risk-aware culture?

A.

Personal information requires different security controls than sensitive information.

B.

Employee access should be based on the principle of least privilege.

C.

Understanding an information asset's value is critical to risk management.

D.

The responsibility for security rests with all employees.

Full Access
Question # 199

When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:

A.

consider the organizations business strategy.

B.

consider the strategic objectives of the program.

C.

leverage industry benchmarks.

D.

identify the program's risk and compensating controls.

Full Access
Question # 200

While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?

A.

The test is scheduled to reduce operational impact.

B.

The test involves IT members in the test process.

C.

The test addresses the critical components.

D.

The test simulates actual prime-time processing conditions.

Full Access
Go to page: