Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 233

A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:

A.

analysis of current threat landscape.

B.

historical data of reported incidents.

C.

projected return on investment (ROI).

D.

industry benchmarking gap analysis.

Full Access
Question # 234

Which of the following is the BEST way to ensure the capability to restore clean data after a ransomware attack?

A.

Purchase cyber insurance

B.

Encrypt sensitive production data

C.

Perform Integrity checks on backups

D.

Maintain multiple offline backups

Full Access
Question # 235

Which of the following should be the PRIMARY focus of an organization with immature incident detection capabilities?

A.

Performing penetration testing

B.

Improving user awareness

C.

Installing new firewalls

D.

Updating security policies

Full Access
Question # 236

An information security manager is assessing security risk associated with a cloud service provider. Which of the following is the MOST appropriate reference to consult when performing this assessment?

A.

Previous provider service level agreements (SLAs)

B.

Security control frameworks

C.

Threat intelligence reports

D.

Penetration test results from the provider

Full Access
Question # 237

How does an incident response team BEST leverage the results of a business impact analysis (BIA)?

A.

Assigning restoration priority during incidents

B.

Determining total cost of ownership (TCO)

C.

Evaluating vendors critical to business recovery

D.

Calculating residual risk after the incident recovery phase

Full Access
Question # 238

The PRIMARY reason for creating a business case when proposing an information security project is to:

A.

articulate inherent risks.

B.

provide demonstrated return on investment (ROI).

C.

establish the value of the project in relation to business objectives.

D.

gain key business stakeholder engagement.

Full Access
Question # 239

In which cloud model does the cloud service buyer assume the MOST security responsibility?

A.

Disaster Recovery as a Service (DRaaS)

B.

Infrastructure as a Service (laaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Full Access
Question # 240

Threat and vulnerability assessments are important PRIMARILY because they are:

A.

used to establish security investments

B.

the basis for setting control objectives.

C.

elements of the organization's security posture.

D.

needed to estimate risk.

Full Access
Go to page: