Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 25

During which of the following development phases is it MOST challenging to implement security controls?

A.

Post-implementation phase

B.

Implementation phase

C.

Development phase

D.

Design phase

Full Access
Question # 26

During which phase of an incident response plan is the root cause determined?

A.

Recovery

B.

Lessons learned

C.

Containment

D.

Eradication

Full Access
Question # 27

An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?

A.

Data masking

B.

Data retention strategy

C.

Data encryption standards

D.

Data loss prevention (DLP)

Full Access
Question # 28

Information security policies should PRIMARILY reflect alignment with:

A.

an information security framework.

B.

industry best practices.

C.

data security standards.

D.

senior management intent.

Full Access
Question # 29

Which of the following provides the BEST assurance that security policies are applied across business operations?

A.

Organizational standards are included in awareness training.

B.

Organizational standards are enforced by technical controls.

C.

Organizational standards are required to be formally accepted.

D.

Organizational standards are documented in operational procedures.

Full Access
Question # 30

Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?

A.

Increase the frequency of system backups.

B.

Review the mitigating security controls.

C.

Notify staff members of the threat.

D.

Assess the risk to the organization.

Full Access
Question # 31

Which of the following is the MOST essential element of an information security program?

A.

Benchmarking the program with global standards for relevance

B.

Prioritizing program deliverables based on available resources

C.

Involving functional managers in program development

D.

Applying project management practices used by the business

Full Access
Question # 32

The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:

A.

cause fewer potential production issues.

B.

require less IT staff preparation.

C.

simulate real-world attacks.

D.

identify more threats.

Full Access
Go to page: