Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 209

Which of the following should be the PRIMARY goal of information security?

A.

Information management

B.

Regulatory compliance

C.

Data governance

D.

Business alignment

Full Access
Question # 210

Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?

A.

Disconnect the system from the network.

B.

Change passwords on the compromised system.

C.

Restore the system from a known good backup.

D.

Perform operation system hardening.

Full Access
Question # 211

When establishing an information security governance framework, it is MOST important for an information security manager to understand:

A.

information security best practices.

B.

risk management techniques.

C.

the threat environment.

D.

the corporate culture.

Full Access
Question # 212

When assigning a risk owner, the MOST important consideration is to ensure the owner has:

A.

adequate knowledge of risk treatment and related control activities.

B.

decision-making authority and the ability to allocate resources for risk.

C.

sufficient time for monitoring and managing the risk effectively.

D.

risk communication and reporting skills to enable decision-making.

Full Access
Question # 213

Which of the following is BEST used to determine the maturity of an information security program?

A.

Security budget allocation

B.

Organizational risk appetite

C.

Risk assessment results

D.

Security metrics

Full Access
Question # 214

The PRIMARY consideration when responding to a ransomware attack should be to ensure:

A.

backups are available.

B.

the most recent patches have been applied.

C.

the ransomware attack is contained

D.

the business can operate

Full Access
Question # 215

When developing an information security strategy for an organization, which of the following is MOST helpful for understanding where to focus efforts?

A.

Gap analysis

B.

Project plans

C.

Vulnerability assessment

D.

Business impact analysis (BIA)

Full Access
Question # 216

An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?

A.

Implementing automated vulnerability scanning in the help desk workflow

B.

Changing the default setting for all security incidents to the highest priority

C.

Integrating automated service level agreement (SLA) reporting into the help desk ticketing system

D.

Integrating incident response workflow into the help desk ticketing system

Full Access
Go to page: