Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 121

Which of the following is PRIMARILY determined by asset classification?

A.

Insurance coverage required for assets

B.

Level of protection required for assets

C.

Priority for asset replacement

D.

Replacement cost of assets

Full Access
Question # 122

Which of the following is MOST critical when creating an incident response plan?

A.

Identifying vulnerable data assets

B.

Identifying what constitutes an incident

C.

Documenting incident notification and escalation processes

D.

Aligning with the risk assessment process

Full Access
Question # 123

Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?

A.

Security risk analysis

B.

Gap assessment

C.

Maturity assessment

D.

Vulnerability scan report

Full Access
Question # 124

A recovery point objective (RPO) is required in which of the following?

A.

Disaster recovery plan (DRP)

B.

Information security plan

C.

Incident response plan

D.

Business continuity plan (BCP)

Full Access
Question # 125

Which of the following is MOST important when conducting a forensic investigation?

A.

Analyzing system memory

B.

Documenting analysis steps

C.

Capturing full system images

D.

Maintaining a chain of custody

Full Access
Question # 126

A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?

A.

The time and location that the breach occurred

B.

Evidence of previous incidents caused by the user

C.

The underlying reason for the user error

D.

Appropriate disciplinary procedures for user error

Full Access
Question # 127

Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?

A.

Execute a risk treatment plan.

B.

Review contracts and statements of work (SOWs) with vendors.

C.

Implement data regionalization controls.

D.

Determine current and desired state of controls.

Full Access
Question # 128

A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?

A.

Instruct the vendor to conduct penetration testing.

B.

Suspend the connection to the application in the firewall

C.

Report the situation to the business owner of the application.

D.

Initiate the organization's incident response process.

Full Access
Go to page: