Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISM Exam Dumps - Certified Information Security Manager

Searching for workable clues to ace the Isaca CISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 265

Which of the following is the MOST important issue in a penetration test?

A.

Having an independent group perform the test

B.

Obtaining permission from audit

C.

Performing the test without the benefit of any insider knowledge

D.

Having a defined goal as well as success and failure criteria

Full Access
Question # 266

An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?

A.

Security requirements are included in the vendor contract

B.

External security audit results are reviewed.

C.

Service level agreements (SLAs) meet operational standards.

D.

Business continuity contingency planning is provided

Full Access
Question # 267

Which of the following is the BEST strategy when determining an organization’s approach to risk treatment?

A.

Advancing the maturity of existing controls based on risk tolerance

B.

Prioritizing controls that directly mitigate the organization's most critical risks

C.

Implementing risk mitigation controls that are considered quick wins

D.

Implementing a one-size-fits-all set of controls across all organizational units

Full Access
Question # 268

Which of the following is the MOST important constraint to be considered when developing an information security strategy?

A.

Legal and regulatory requirements

B.

Established security policies and standards

C.

Compliance with an international security standard

D.

Information security architecture

Full Access
Question # 269

Which is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?

A.

Parallel test

B.

Full interruption test

C.

Simulation test

D.

Tabletop test

Full Access
Question # 270

An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?

A.

Risk levels may be elevated beyond acceptable limits.

B.

Security audits may report more high-risk findings.

C.

The compensating controls may not be cost efficient.

D.

Noncompliance with industry best practices may result.

Full Access
Question # 271

A business impact analysis (BIA) should be periodically executed PRIMARILY to:

A.

validate vulnerabilities on environmental changes.

B.

analyze the importance of assets.

C.

check compliance with regulations.

D.

verify the effectiveness of controls.

Full Access
Question # 272

Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?

A.

Data privacy officer

B.

Information security manager

C.

Head of IT department

D.

Head of human resources (HR)

Full Access
Go to page: