Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISM Exam Dumps - Certified Information Security Manager

Searching for workable clues to ace the Isaca CISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 249

During which of the following development phases is it MOST challenging to implement security controls?

A.

Post-implementation phase

B.

Implementation phase

C.

Development phase

D.

Design phase

Full Access
Question # 250

When collecting admissible evidence, which of the following is the MOST important requirement?

A.

Need to know

B.

Preserving audit logs

C.

Due diligence

D.

Chain of custody

Full Access
Question # 251

Which of the following is MOST important to maintain integration among the incident response plan, business continuity plan (BCP). and disaster recovery plan (DRP)?

A.

Asset classification

B.

Recovery time objectives (RTOs)

C.

Chain of custody

D.

Escalation procedures

Full Access
Question # 252

Which of the following should be given the HIGHEST priority during an information security post-incident review?

A.

Documenting actions taken in sufficient detail

B.

Updating key risk indicators (KRIs)

C.

Evaluating the performance of incident response team members

D.

Evaluating incident response effectiveness

Full Access
Question # 253

Which of the following is the PRIMARY reason for granting a security exception?

A.

The risk is justified by the cost to the business.

B.

The risk is justified by the benefit to security.

C.

The risk is justified by the cost to security.

D.

The risk is justified by the benefit to the business.

Full Access
Question # 254

Which of the following is MOST important when conducting a forensic investigation?

A.

Analyzing system memory

B.

Documenting analysis steps

C.

Capturing full system images

D.

Maintaining a chain of custody

Full Access
Question # 255

Security administration efforts will be greatly reduced following the deployment of which of the following techniques?

A.

Discretionary access control

B.

Role-based access control

C.

Access control lists

D.

Distributed access control

Full Access
Question # 256

An information security manager has been tasked with developing materials to update the board, regulatory agencies, and the media about a security incident. Which of the following should the information security manager do FIRST?

A.

Set up communication channels for the target audience.

B.

Determine the needs and requirements of each audience.

C.

Create a comprehensive singular communication

D.

Invoke the organization's incident response plan.

Full Access
Go to page: