Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 41

Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.

Which of the following should be the PRIMARY focus of Company A's information security manager?

A.

The organizational structure of Company B

B.

The cost to align to Company A's security policies

C.

Company A's security architecture

D.

Company B's security policies

Full Access
Question # 42

Which of the following BEST illustrates residual risk within an organization?

A.

Heat map

B.

Risk management framework

C.

Business impact analysis (BIA)

D.

Balanced scorecard

Full Access
Question # 43

A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?

A.

Automate user provisioning activities.

B.

Maintain strict control over user provisioning activities.

C.

Formally document IT administrator activities.

D.

Implement monitoring of IT administrator activities.

Full Access
Question # 44

Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?

A.

The vendor's proposal allows for contract modification during technology refresh cycles.

B.

The vendor's proposal aligns with the objectives of the organization.

C.

The vendor's proposal requires the provider to have a business continuity plan (BCP).

D.

The vendor's proposal allows for escrow in the event the third party goes out of business.

Full Access
Question # 45

An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:

A.

conduct an incident forensic analysis.

B.

fallow the incident response plan

C.

notify the business process owner.

D.

fallow the business continuity plan (BCP).

Full Access
Question # 46

The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:

A.

signature analysis.

B.

behavior analysis.

C.

penetration testing.

D.

data packet analysis.

Full Access
Question # 47

Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?

A.

Program metrics

B.

Key risk indicators (KRIs)

C.

Risk register

D.

Security strategy

Full Access
Question # 48

In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or

A.

Security budget

B.

Risk register

C.

Risk score

D.

Laws and regulations

Full Access
Go to page: