Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 57

When updating the information security policy to accommodate a new regulation, the information security manager should FIRST:

A.

Review key risk indicators (KRIs)

B.

Perform a gap analysis

C.

Consult process owners

D.

Update key performance indicators (KPIs)

Full Access
Question # 58

The use of a business case to obtain funding for an information security investment is MOST effective when the business case:

A.

relates the investment to the organization's strategic plan.

B.

translates information security policies and standards into business requirements.

C.

articulates management's intent and information security directives in clear language.

D.

realigns information security objectives to organizational strategy.

Full Access
Question # 59

Which of the following is the PRIMARY benefit of an information security awareness training program?

A.

Influencing human behavior

B.

Evaluating organizational security culture

C.

Defining risk accountability

D.

Enforcing security policy

Full Access
Question # 60

Which type of plan is PRIMARILY intended to reduce the potential impact of security events that may occur?

A.

Security awareness plan

B.

Business continuity plan (BCP)

C.

Disaster recovery plan (DRP)

D.

Incident response plan

Full Access
Question # 61

Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?

A.

Data owner

B.

Business owner

C.

Information security manager

D.

Compliance manager

Full Access
Question # 62

The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:

A.

scope of the business continuity program.

B.

resources needed for business recovery.

C.

recovery time objective (RTO).

D.

scope of the incident response plan.

Full Access
Question # 63

Which of the following is the MOST important issue in a penetration test?

A.

Having an independent group perform the test

B.

Obtaining permission from audit

C.

Performing the test without the benefit of any insider knowledge

D.

Having a defined goal as well as success and failure criteria

Full Access
Question # 64

An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?

A.

No owners were identified for some risks.

B.

Business applications had the highest number of risks.

C.

Risk mitigation action plans had no timelines.

D.

Risk mitigation action plan milestones were delayed.

Full Access
Go to page: