Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 17

Which of the following should be the PRIMARY basis for an information security strategy?

A.

The organization's vision and mission

B.

Results of a comprehensive gap analysis

C.

Information security policies

D.

Audit and regulatory requirements

Full Access
Question # 18

A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?

A.

Ensure a risk assessment is performed to evaluate the findings

B.

Ensure vulnerabilities found are resolved within acceptable timeframes

C.

Request funding needed to resolve the top vulnerabilities

D.

Report findings to senior management

Full Access
Question # 19

The PRIMARY purpose for continuous monitoring of security controls is to ensure:

A.

control gaps are minimized.

B.

system availability.

C.

effectiveness of controls.

D.

alignment with compliance requirements.

Full Access
Question # 20

Which of the following is the MOST appropriate metric to demonstrate the effectiveness of information security controls to senior management?

A.

Downtime due to malware infections

B.

Number of security vulnerabilities uncovered with network scans

C.

Percentage of servers patched

D.

Annualized loss resulting from security incidents

Full Access
Question # 21

A risk owner has accepted a large amount of risk due to the high cost of controls. Which of the following should be the information security manager's PRIMARY focus in this situation?

A.

Establishing a strong ongoing risk monitoring process

B.

Presenting the risk profile for approval by the risk owner

C.

Conducting an independent review of risk responses

D.

Updating the information security standards to include the accepted risk

Full Access
Question # 22

After a server has been attacked, which of the following is the BEST course of action?

A.

Initiate incident response.

B.

Review vulnerability assessment.

C.

Conduct a security audit.

D.

Isolate the system.

Full Access
Question # 23

An employee who is a remote user has copied financial data from the corporate server to a laptop using virtual private network (VPN) connectivity. Which of the following is the MOST important factor to determine if it should be classified as a data leakage incident?

A.

Review of the audit logs

B.

Ownership of the data

C.

Employee's job role

D.

Valid use case

Full Access
Question # 24

Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?

A.

A capability and maturity assessment

B.

Detailed analysis of security program KPIs

C.

An information security dashboard

D.

An information security risk register

Full Access
Go to page: