Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Searching for workable clues to ace the Isaca CISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 281

Which of the following change management procedures is MOST likely to cause concern to the information security manager?

A.

Fallback processes are tested the weekend before changes are made

B.

Users are not notified of scheduled system changes

C.

A manual rather than an automated process is used to compare program versions.

D.

The development manager migrates programs into production

Full Access
Question # 282

An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?

A.

Business impact analysis (BIA)

B.

Business continuity plan (BCP)

C.

Incident response plan

D.

Disaster recovery plan (DRP)

Full Access
Question # 283

An internal audit has revealed that a number of information assets have been inappropriately classified. To correct the classifications, the remediation accountability should be assigned to:

A.

the business users.

B.

the information owners.

C.

the system administrators.

D.

senior management.

Full Access
Question # 284

Which of the following is the PRIMARY reason for granting a security exception?

A.

The risk is justified by the cost to the business.

B.

The risk is justified by the benefit to security.

C.

The risk is justified by the cost to security.

D.

The risk is justified by the benefit to the business.

Full Access
Question # 285

Which of the following BEST enables an incident response team to determine appropriate actions during an initial investigation?

A.

Feedback from affected departments

B.

Historical data from past incidents

C.

Technical capabilities of the team

D.

Procedures for incident triage

Full Access
Question # 286

Communicating which of the following would be MOST helpful to gain senior management support for risk treatment options?

A.

Quantitative loss

B.

Industry benchmarks

C.

Threat analysis

D.

Root cause analysis

Full Access
Question # 287

Which of the following MUST be established to maintain an effective information security governance framework?

A.

Security controls automation

B.

Defined security metrics

C.

Change management processes

D.

Security policy provisions

Full Access
Question # 288

Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?

A.

Reliable image backups

B.

Impact assessment

C.

Documented eradication procedures

D.

Root cause analysis

Full Access
Go to page: