Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 225

When taking a risk-based approach to vulnerability management, which of the following is MOST important to consider when prioritizing a vulnerability?

A.

The information available about the vulnerability

B.

The sensitivity of the asset and the data it contains

C.

IT resource availability and constraints

D.

Whether patches have been developed and tested

Full Access
Question # 226

Which of the following BEST enables an organization to effectively manage emerging cyber risk?

A.

Periodic internal and external audits

B.

Clear lines of responsibility

C.

Sufficient cyber budget allocation

D.

Cybersecurity policies

Full Access
Question # 227

A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:

A.

analysis of current threat landscape.

B.

historical data of reported incidents.

C.

projected return on investment (ROI).

D.

industry benchmarking gap analysis.

Full Access
Question # 228

How does an organization PRIMARILY benefit from the creation of an information security steering committee?

A.

An increase in information security risk awareness

B.

An increased alignment with industry security trends that impact the business

C.

An increased focus on information security resource management

D.

An increased alignment of information security with the business

Full Access
Question # 229

Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?

A.

Conduct a business impact analysis (BIA).

B.

Conduct periodic awareness training.

C.

Perform a security gap analysis.

D.

Perform network penetration testing.

Full Access
Question # 230

Which type of recovery site is MOST reliable and can support stringent recovery requirements?

A.

Cold site

B.

Warm site

C.

Hot site

D.

Mobile site

Full Access
Question # 231

Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?

A.

Threat analytics software

B.

Host intrusion detection system

C.

SIEM

D.

Network intrusion detection system

Full Access
Question # 232

Which of the following is MOST important to consider when defining control objectives?

A.

Industry best practices

B.

An information security framework

C.

Control recommendations from a recent audit

D.

The organization's risk appetite

Full Access
Go to page: