Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 193

An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?

A.

Requirement for regular information security awareness

B.

Right-to-audit clause

C.

Service level agreement (SLA)

D.

Requirement to comply with corporate security policy

Full Access
Question # 194

An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?

A.

IT strategy

B.

Security architecture

C.

Business case

D.

Risk assessment

Full Access
Question # 195

The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?

A.

Inform senior management

B.

Re-evaluate the risk

C.

Implement compensating controls

D.

Ask the business owner for the new remediation plan

Full Access
Question # 196

Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?

A.

Alive demonstration of the third-party supplier's security capabilities

B.

The ability to i third-party supplier's IT systems and processes

C.

Third-party security control self-assessment (CSA) results

D.

An independent review report indicating compliance with industry standards

Full Access
Question # 197

When defining a security baseline, it is MOST important that the baseline:

A.

can vary depending on the security classification of systems.

B.

is uniform for all assets of the same type.

C.

is developed based on stakeholder consensus.

D.

aligns to key risk indicators (KRIs).

Full Access
Question # 198

Of the following, who is in the BEST position to evaluate business impacts?

A.

Senior management

B.

Information security manager

C.

IT manager

D.

Process manager

Full Access
Question # 199

Which of the following is the MOST effective way to convey information security responsibilities across an organization?

A.

Implementing security awareness programs

B.

Documenting information security responsibilities within job descriptions

C.

Developing a skills matrix

D.

Defining information security responsibilities in the security policy

Full Access
Question # 200

An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?

A.

Conduct an impact assessment.

B.

Isolate the affected systems.

C.

Rebuild the affected systems.

D.

Initiate incident response.

Full Access
Go to page: