Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 225

Which of the following BEST enables an organization to operate smoothly with reduced capacities when service has been disrupted?

A.

Crisis management plan

B.

Disaster recovery plan (DRP)

C.

Incident response plan

D.

Business continuity plan (BCP)

Full Access
Question # 226

Which of the following BEST indicates that an information security governance framework has been successfully implemented?

A.

The framework aligns internal and external resources.

B.

The framework aligns security processes with industry best practices.

C.

The framework aligns management and other functions within the security organization.

D.

The framework includes commercial off-the-shelf security solutions.

Full Access
Question # 227

Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?

A.

Legal

B.

Information security

C.

Help desk

D.

Human resources (HR)

Full Access
Question # 228

Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of

confidentiality?

A.

Ensuring hashing of administrator credentials

B.

Enforcing service level agreements (SLAs)

C.

Ensuring encryption for data in transit

D.

Utilizing a formal change management process

Full Access
Question # 229

After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:

A.

determine the potential impact.

B.

reevaluate the standards.

C.

implement compensating controls.

D.

evaluate the cost of replacing the applications.

Full Access
Question # 230

Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?

A.

Risk acceptance by the business has been documented

B.

Teams and individuals responsible for recovery have been identified

C.

Copies of recovery and incident response plans are kept offsite

D.

Incident response and recovery plans are documented in simple language

Full Access
Question # 231

Which of the following should be the PRIMARY basis for an information security strategy?

A.

The organization's vision and mission

B.

Results of a comprehensive gap analysis

C.

Information security policies

D.

Audit and regulatory requirements

Full Access
Question # 232

Which of the following is the MOST critical factor for information security program success?

A.

comprehensive risk assessment program for information security

B.

The information security manager's knowledge of the business

C.

Security staff with appropriate training and adequate resources

D.

Ongoing audits and addressing open items

Full Access
Go to page: