Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 73

Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?

A.

Escalation processes

B.

Technological capabilities

C.

Recovery time objective (RTO)

D.

Security audit reports

Full Access
Question # 74

Which of the following is MOST important for an information security manager to consider when determining whether data should be stored?

A.

Data protection regulations

B.

Data storage limitations

C.

Business requirements

D.

Type and nature of data

Full Access
Question # 75

A new regulatory requirement affecting an organization's information security program is released. Which of the following should be the information security manager's FIRST course of action?

A.

Perform a gap analysis.

B.

Conduct benchmarking.

C.

Notify the legal department.

D.

Determine the disruption to the business.

Full Access
Question # 76

Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?

A.

Review the key performance indicator (KPI) dashboard

B.

Review security-related key risk indicators (KRIs)

C.

Review control self-assessment (CSA) results

D.

Review periodic security audits

Full Access
Question # 77

Which of the following processes is MOST important for the success of a business continuity plan (BCP)?

A.

Involving all stakeholders in testing and training

B.

Scheduling periodic internal and external audits

C.

Including the board and senior management in plan reviews

D.

Maintaining copies of the plan at the primary and recovery sites

Full Access
Question # 78

Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?

A.

Enforcing data retention

B.

Developing policy standards

C.

Benchmarking against industry peers

D.

Categorizing information assets

Full Access
Question # 79

Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?

A.

Mapping risk scenarios according to sensitivity of data

B.

Reviewing mitigating and compensating controls for each risk scenario

C.

Mapping the risk scenarios by likelihood and impact on a chart

D.

Performing a risk assessment on the laaS provider

Full Access
Question # 80

The categorization of incidents is MOST important for evaluating which of the following?

A.

Appropriate communication channels

B.

Allocation of needed resources

C.

Risk severity and incident priority

D.

Response and containment requirements

Full Access
Go to page: