Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 73

Which of the following is the GREATEST benefit of information asset classification?

A.

Helping to determine the recovery point objective (RPO)

B.

Providing a basis for implementing a need-to-know policy

C.

Supporting segregation of duties

D.

Defining resource ownership

Full Access
Question # 74

What is the PRIMARY objective of implementing standard security configurations?

A.

Maintain a flexible approach to mitigate potential risk to unsupported systems.

B.

Minimize the operational burden of managing and monitoring unsupported systems.

C.

Control vulnerabilities and reduce threats from changed configurations.

D.

Compare configurations between supported and unsupported systems.

Full Access
Question # 75

Which of the following is the MOST important consideration when updating procedures for managing security devices?

A.

Updates based on the organization's security framework

B.

Notification to management of the procedural changes

C.

Updates based on changes m risk technology and process

D.

Review and approval of procedures by management

Full Access
Question # 76

Which of the following is the BEST strategy when determining an organization's approach to risk treatment?

A.

Implementing risk mitigation controls that are considered quick wins

B.

Prioritizing controls that directly mitigate the organization's most critical risks

C.

Advancing the maturity of existing controls based on risk tolerance

D.

Implementing a one-size-fits-all set of controls across all organizational units

Full Access
Question # 77

The PRIMARY goal when conducting post-incident reviews is to identify:

A.

Additional cybersecurity budget needs

B.

Weaknesses in incident response plans

C.

Information to be shared with senior management

D.

Individuals that need additional training

Full Access
Question # 78

An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be in the business continuity plan (BCP) to manage this requirement?

A.

Maximum tolerable downtime (MTD)

B.

Service level agreement (SLA)

C.

Recovery point objective (RPO)

D.

Recovery time objective (RTO)

Full Access
Question # 79

Which of the following would BEST enable the timely execution of an incident response plan?

A.

The introduction of a decision support tool

B.

Definition of trigger events

C.

Clearly defined data classification process

D.

Centralized service desk

Full Access
Question # 80

Which of the following is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?

A.

Poor documentation of results and lessons learned

B.

Lack of communication to affected users

C.

Disruption to the production environment

D.

Lack of coordination among departments

Full Access
Go to page: