Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 273

Which of the following is the MOST important consideration during the design phase of a business impact analysis (BIA)?

A.

Selecting quality metrics to monitor business performance

B.

Estimating the likelihood that end-to-end processes will be disrupted

C.

Obtaining reserve funding to prepare for possible business failures

D.

Identifying critical functions for business operations

Full Access
Question # 274

Which of the following is CRITICAL to ensure the appropriate stakeholder makes decisions during a cybersecurity incident?

A.

Stakeholder plan

B.

Escalation plan

C.

Up-to-date risk register

D.

Asset classification

Full Access
Question # 275

Which of the following should be an information security manager's PRIMARY concern when an organization is expanding business to a new country?

A.

Compliance with local regulations

B.

Changes in IT infrastructure

C.

Cultural differences in the new country

D.

Ability to gather customer data

Full Access
Question # 276

Which of the following is MOST effective for communicating forward-looking trends within security reporting?

A.

Key control indicator (KCIs)

B.

Key risk indicators (KRIs)

C.

Key performance indicators (KPIs)

D.

Key goal indicators (KGIs)

Full Access
Question # 277

Which of the following BEST enables an organization to transform its culture to support information security?

A.

Periodic compliance audits

B.

Strong management support

C.

Robust technical security controls

D.

Incentives for security incident reporting

Full Access
Question # 278

Which of the following is MOST likely to reduce the effectiveness of a SIEM system?

A.

Lack of multi-factor authentication (MFA) for system access

B.

Weakly encrypted log files

C.

Misconfiguration of alert thresholds

D.

Complex user interface

Full Access
Question # 279

When is the BEST time to verify that a production system's security mechanisms meet control objectives?

A.

During quality and acceptance checks

B.

On a continuous basis through monitoring activities and automated tooling

C.

After remediations recommended by penetration tests have been completed

D.

During annual internal and compliance audits

Full Access
Question # 280

Which of the following is the PRIMARY reason to use a phased incident recovery approach?

A.

To gain management buy-in

B.

To give the response team time to analyze incidents

C.

To ensure critical systems are recovered first

D.

To prioritize remediation steps

Full Access
Go to page: