Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 241

An organization uses a security standard that has undergone a major revision by the certifying authority. The old version of the standard will no longer be used for organizations wishing to maintain their certifications. Which of the following should be the FIRST

course of action?

A.

Evaluate the cost of maintaining the certification.

B.

Review the new standard for applicability to the business.

C.

Modify policies to ensure new requirements are covered.

D.

Communicate the new standard to senior leadership.

Full Access
Question # 242

Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?

A.

Senior management

B.

Information owner

C.

Business manager

D.

Information security manager

Full Access
Question # 243

Data classification is PRIMARILY the responsibility of:

A.

senior management.

B.

the data custodian.

C.

the data owner.

D.

the security manager.

Full Access
Question # 244

Which of the following is MOST likely to reduce the effectiveness of a SIEM system?

A.

Lack of multi-factor authentication (MFA) for system access

B.

Weakly encrypted log files

C.

Misconfiguration of alert thresholds

D.

Complex user interface

Full Access
Question # 245

Which of the following is the BEST indication of a mature information security program?

A.

Security incidents are managed properly.

B.

Security spending is below budget.

C.

Security resources are optimized.

D.

Security audit findings are reduced.

Full Access
Question # 246

An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?

A.

Identification of risk

B.

Analysis of control gaps

C.

Design of key risk indicators (KRIs)

D.

Selection of risk treatment options

Full Access
Question # 247

Which of the following is the BEST course of action for an information security manager to align security and business goals?

A.

Conducting a business impact analysis (BIA)

B.

Reviewing the business strategy

C.

Defining key performance indicators (KPIs)

D.

Actively engaging with stakeholders

Full Access
Question # 248

Which of the following is the BEST approach to make strategic information security decisions?

A.

Establish regular information security status reporting.

B.

Establish an information security steering committee.

C.

Establish business unit security working groups.

D.

Establish periodic senior management meetings.

Full Access
Go to page: