Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 65

Which of the following is the MOST critical factor for information security program success?

A.

comprehensive risk assessment program for information security

B.

The information security manager's knowledge of the business

C.

Security staff with appropriate training and adequate resources

D.

Ongoing audits and addressing open items

Full Access
Question # 66

Which of the following is the BEST starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities?

A.

Controls analysis

B.

Emerging risk review

C.

Penetration testing

D.

Traffic monitoring

Full Access
Question # 67

When determining an acceptable risk level which of the following is the MOST important consideration?

A.

Threat profiles

B.

System criticalities

C.

Vulnerability scores

D.

Risk matrices

Full Access
Question # 68

An organization uses a security standard that has undergone a major revision by the certifying authority. The old version of the standard will no longer be used for organizations wishing to maintain their certifications. Which of the following should be the FIRST

course of action?

A.

Evaluate the cost of maintaining the certification.

B.

Review the new standard for applicability to the business.

C.

Modify policies to ensure new requirements are covered.

D.

Communicate the new standard to senior leadership.

Full Access
Question # 69

An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?

A.

Perform a gap analysis.

B.

Consult with senior management on the best course of action.

C.

Implement a program of work to comply with the new legislation.

D.

Understand the cost of noncompliance.

Full Access
Question # 70

Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?

A.

Disaster recovery plan (DRP)

B.

Incident notification plan

C.

Risk response scenarios

D.

Security procedures

Full Access
Question # 71

Which of the following is the BEST course of action when using a web application that has known vulnerabilities?

A.

Monitor application level logs.

B.

Deploy host-based intrusion detection.

C.

Deploy an application firewall.

D.

Install anti-spyware software.

Full Access
Question # 72

Which of the following is MOST important to include in a post-incident review following a data breach?

A.

An evaluation of the effectiveness of the information security strategy

B.

Evaluations of the adequacy of existing controls

C.

Documentation of regulatory reporting requirements

D.

A review of the forensics chain of custom

Full Access
Go to page: