Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 241

Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?

A.

Evaluate the results of business continuity testing.

B.

Review key performance indicators (KPIs).

C.

Evaluate the business impact of incidents.

D.

Engage business process owners.

Full Access
Question # 242

Embedding security responsibilities into job descriptions is important PRIMARILY because it:

A.

supports access management.

B.

simplifies development of the security awareness program.

C.

aligns security to the human resources (HR) function.

D.

strengthens employee accountability.

Full Access
Question # 243

What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?

A.

Perform a vulnerability assessment on the systems within the department.

B.

Introduce additional controls to force compliance with policy.

C.

Require department users to repeat security awareness training.

D.

Report the policy violation to senior management.

Full Access
Question # 244

Which of the following is MOST helpful in determining the criticality of an organization's business functions?

A.

Disaster recovery plan (DRP)

B.

Business impact analysis (BIA)

C.

Business continuity plan (BCP)

D.

Security assessment report (SAR)

Full Access
Question # 245

Which of the following BEST supports investments in an information security program?

A.

Business cases

B.

Business impact analysis (BIA)

C.

Gap analysis results

D.

Risk assessment results

Full Access
Question # 246

The PRIMARY goal of a post-incident review should be to:

A.

establish the cost of the incident to the business.

B.

determine why the incident occurred.

C.

identify policy changes to prevent a recurrence.

D.

determine how to improve the incident handling process.

Full Access
Question # 247

Which of the following BEST prepares a computer incident response team for a variety of information security scenarios?

A.

Forensics certification

B.

Disaster recovery drills

C.

Tabletop exercises

D.

Penetration tests

Full Access
Question # 248

Which of the following is MOST important when conducting a forensic investigation?

A.

Analyzing system memory

B.

Documenting analysis steps

C.

Capturing full system images

D.

Maintaining a chain of custody

Full Access
Go to page: