Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Searching for workable clues to ace the Isaca CISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 25

A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:

A.

require that the change be reversed

B.

review the change management process

C.

perform an analysis of the change

D.

report the event to senior management

Full Access
Question # 26

Which of the following provides the MOST effective response against ransomware attacks?

A.

Automatic quarantine of systems

B.

Thorough communication plans

C.

Effective backup plans and processes

D.

Strong password requirements

Full Access
Question # 27

Which of the following is necessary to ensure consistent protection for an organization's information assets?

A.

Classification model

B.

Control assessment

C.

Data ownership

D.

Regulatory requirements

Full Access
Question # 28

Which of the following components of an information security risk assessment is MOST valuable to senior management?

A.

Threat profile

B.

Residual risk

C.

Return on investment (ROI)

D.

Mitigation actions

Full Access
Question # 29

Which of the following is the PRIMARY objective of a business impact analysis (BIA)?

A.

Determine recovery priorities.

B.

Define the recovery point objective (RPO).

C.

Confirm control effectiveness.

D.

Analyze vulnerabilities.

Full Access
Question # 30

Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?

A.

Business impact analysis (BIA)

B.

Risk register

C.

Penetration testing

D.

Vulnerability assessment

Full Access
Question # 31

Which of the following is the MOST important consideration during the design phase of a business impact analysis (BIA)?

A.

Selecting quality metrics to monitor business performance

B.

Estimating the likelihood that end-to-end processes will be disrupted

C.

Obtaining reserve funding to prepare for possible business failures

D.

Identifying critical functions for business operations

Full Access
Question # 32

Which of the following BEST supports investments in an information security program?

A.

Business cases

B.

Business impact analysis (BIA)

C.

Gap analysis results

D.

Risk assessment results

Full Access
Go to page: