Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 201

Penetration testing is MOST appropriate when a:

A.

new system is about to go live.

B.

new system is being designed.

C.

security policy is being developed.

D.

security incident has occurred,

Full Access
Question # 202

A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:

A.

incident has been confirmed.

B.

incident has been contained.

C.

potential incident has been logged.

D.

incident has been mitigated.

Full Access
Question # 203

Which of the following is the MOST important factor in successfully implementing Zero Trust?

A.

Preferring networks that have undergone penetration testing

B.

Focusing on logging and monitoring of user behavior

C.

Authenticating and authorizing strategic points of the architecture

D.

Understanding each component of the network

Full Access
Question # 204

Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?

A.

Enhanced data governance

B.

Increased third-party assurance

C.

)Improved incident management

D.

Reduced total cost of ownership (TCO)

Full Access
Question # 205

Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P

A.

Report the decision to the compliance officer

B.

Update details within the risk register.

C.

Reassess the organization's risk tolerance.

D.

Assess the impact of the regulation.

Full Access
Question # 206

Which of the following is the BEST indicator of a successful intrusion into an organization's systems?

A.

Decrease in internal network traffic

B.

Increase in the number of failed login attempts

C.

Increase in the number of irregular application requests

D.

Decrease in available storage space

Full Access
Question # 207

During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:

A.

perform a risk assessment.

B.

review the state of security awareness.

C.

review information security policies.

D.

perform a gap analysis.

Full Access
Question # 208

During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?

A.

The certification includes industry-recognized security controls.

B.

The certification was issued within the last five years.

C.

The certification is issued for the specific scope.

D.

The certification is easily verified.

Full Access
Go to page: