Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Searching for workable clues to ace the Isaca CISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 249

Which of the following is the BEST way to obtain support for a new organization-wide information security program?

A.

Benchmark against similar industry organizations

B.

Deliver an information security awareness campaign.

C.

Publish an information security RACI chart.

D.

Establish an information security strategy committee.

Full Access
Question # 250

Which of the following roles is BEST able to influence the security culture within an organization?

A.

Chief information security officer (CISO)

B.

Chief information officer (CIO)

C.

Chief executive officer (CEO)

D.

Chief operating officer (COO)

Full Access
Question # 251

Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?

A.

Recovery

B.

Identification

C.

Containment

D.

Preparation

Full Access
Question # 252

The GREATEST challenge when attempting data recovery of a specific file during forensic analysis is when:

A.

the partition table on the disk has been deleted.

B.

the tile has been overwritten.

C.

all files in the directory have been deleted.

D.

high-level disk formatting has been performed.

Full Access
Question # 253

Which of the following BEST minimizes information security risk in deploying applications to the production environment?

A.

Integrating security controls in each phase of the life cycle

B.

Conducting penetration testing post implementation

C.

Having a well-defined change process

D.

Verifying security during the testing process

Full Access
Question # 254

Which of the following is MOST relevant for an information security manager to communicate to the board of directors?

A.

The level of inherent risk

B.

Vulnerability assessments

C.

The level of exposure

D.

Threat assessments

Full Access
Question # 255

Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?

A.

Risk assessment

B.

Business impact analysis (BIA)

C.

Penetration test results

D.

Vulnerability scan results

Full Access
Question # 256

What is the role of the information security manager in finalizing contract negotiations with service providers?

A.

To perform a risk analysis on the outsourcing process

B.

To obtain a security standard certification from the provider

C.

To update security standards for the outsourced process

D.

To ensure that clauses for periodic audits are included

Full Access
Go to page: