Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 265

The PRIMARY benefit of integrating information security activities into change management processes is to:

A.

protect the organization from unauthorized changes.

B.

ensure required controls are included in changes.

C.

provide greater accountability for security-related changes in the business.

D.

protect the business from collusion and compliance threats.

Full Access
Question # 266

An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?

A.

Lack of availability

B.

Lack of accountability

C.

Improper authorization

D.

Inadequate authentication

Full Access
Question # 267

Which of the following should an information security manager do FIRST when noncompliance with security standards is identified?

A.

Report the noncompliance to senior management.

B.

Validate the noncompliance.

C.

Include the noncompliance in the risk register.

D.

Implement compensating controls to mitigate the noncompliance.

Full Access
Question # 268

Which of the following is MOST appropriate to communicate to senior management regarding information risk?

A.

Emerging security technologies

B.

Risk profile changes

C.

Defined risk appetite

D.

Vulnerability scanning progress

Full Access
Question # 269

What will BEST facilitate the success of new security initiatives?

A.

Establish an IT security steering committee.

B.

Include business in security decision making.

C.

Update security policies on a regular basis

D.

Monitor post-implementation security metrics.

Full Access
Question # 270

Which of the following tools would be MOST helpful to an incident response team?

A.

Intrusion detection system (IDS)

B.

Endpoint detection and response (EDR) solution

C.

User and entity behavior analytics

D.

Vulnerability scanning tools

Full Access
Question # 271

Which of the following is MOST important to the successful implementation of an information security program?

A.

Adequate security resources are allocated to the program.

B.

Key performance indicators (KPIs) are defined.

C.

A balanced scorecard is approved by the steering committee.

D.

The program is developed using global security standards.

Full Access
Question # 272

Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?

A.

Performing penetration tests against the network to demonstrate business vulnerability

B.

Highlighting competitor performance regarding network best security practices

C.

Demonstrating that targeted security controls tie to business objectives

D.

Presenting comparable security implementation estimates from several vendors

Full Access
Go to page: