Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 265

Which of the following is the MOST important consideration when establishing an organization's information security governance committee?

A.

Members have knowledge of information security controls.

B.

Members are business risk owners.

C.

Members are rotated periodically.

D.

Members represent functions across the organization.

Full Access
Question # 266

Who is BEST suited to determine how the information in a database should be classified?

A.

Database analyst

B.

Database administrator (DBA)

C.

Information security analyst

D.

Data owner

Full Access
Question # 267

Which of the following is the BEST indication of an effective disaster recovery planning process?

A.

Hot sites are required for any declared disaster.

B.

Chain of custody is maintained throughout the disaster recovery process.

C.

Post-incident reviews are conducted after each event.

D.

Recovery time objectives (RTOs) are shorter than recovery point objectives (RPOs).

Full Access
Question # 268

Which of the following should be done FIRST when implementing a security program?

A.

Perform a risk analysis

B.

Implement data encryption.

C.

Create an information asset inventory.

D.

Determine the value of information assets.

Full Access
Question # 269

Which of the following is the MOST appropriate risk response when the risk impact has been determined to be immaterial and the likelihood is very low?

A.

Mitigate

B.

Avoid

C.

Transfer

D.

Accept

Full Access
Question # 270

Which of the following is MOST important to include in an information security status report to senior management?

A.

Key risk indicators (KRIs)

B.

Review of information security policies

C.

Information security budget requests

D.

List of recent security events

Full Access
Question # 271

When developing a categorization method for security incidents, the categories MUST:

A.

align with industry standards.

B.

be created by the incident handler.

C.

have agreed-upon definitions.

D.

align with reporting requirements.

Full Access
Question # 272

An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?

A.

Implement the application and request the cloud service provider to fix the vulnerability.

B.

Assess whether the vulnerability is within the organization's risk tolerance levels.

C.

Commission further penetration tests to validate initial test results,

D.

Postpone the implementation until the vulnerability has been fixed.

Full Access
Go to page: