Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISM Exam Dumps - Certified Information Security Manager

Searching for workable clues to ace the Isaca CISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 233

Which of the following is the MOST important consideration when determining which type of failover site to employ?

A.

Reciprocal agreements

B.

Disaster recovery test results

C.

Recovery time objectives (RTOs)

D.

Data retention requirements

Full Access
Question # 234

A business impact analysis (BIA) BEST enables an organization to establish:

A.

annualized loss expectancy (ALE).

B.

recovery methods.

C.

total cost of ownership (TCO).

D.

restoration priorities.

Full Access
Question # 235

Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?

A.

Require remote wipe capabilities for devices.

B.

Conduct security awareness training.

C.

Review and update existing security policies.

D.

Enforce passwords and data encryption on the devices.

Full Access
Question # 236

Which of the following BEST indicates that information security governance and corporate governance are integrated?

A.

The information security team is aware of business goals.

B.

The board is regularly informed of information security key performance indicators (KPIs),

C.

The information security steering committee is composed of business leaders.

D.

A cost-benefit analysis is conducted on all information security initiatives.

Full Access
Question # 237

Which of the following is the MOST likely reason for a vulnerability scanner to return incomplete results?

A.

Unauthenticated vulnerability scans are being performed.

B.

Scan results are not ingested into a security information and event management (SIEM) tool.

C.

Host names have not been fully enumerated.

D.

Zero-day vulnerability signatures have not been ingested.

Full Access
Question # 238

Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?

A.

Containment

B.

Recovery

C.

Eradication

D.

Identification

Full Access
Question # 239

Which of the following BEST enables users to recover from ransomware or malware attacks?

A.

Incident response plans

B.

Frequent system backups

C.

Regular antivirus updates

D.

End-user awareness training

Full Access
Question # 240

Which of the following would be MOST important to include in a proposal justifying investments for an organization's information security program?

A.

Vulnerability scan results

B.

Competitor benchmark analysis

C.

Previous security budget

D.

Business requirements

Full Access
Go to page: