Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 41

A balanced scorecard MOST effectively enables information security:

A.

risk management

B.

project management

C.

governance

D.

performance

Full Access
Question # 42

Which of the following is an example of risk mitigation?

A.

Purchasing insurance

B.

Discontinuing the activity associated with the risk

C.

Improving security controls

D.

Performing a cost-benefit analysis

Full Access
Question # 43

Which of the following should be given the HIGHEST priority during an information security post-incident review?

A.

Documenting actions taken in sufficient detail

B.

Updating key risk indicators (KRIs)

C.

Evaluating the performance of incident response team members

D.

Evaluating incident response effectiveness

Full Access
Question # 44

Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?

A.

Patch management files

B.

Network system logs

C.

Configuration management files

D.

Intrusion detection system (IDS) logs

Full Access
Question # 45

Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?

A.

Require remote wipe capabilities for devices.

B.

Conduct security awareness training.

C.

Review and update existing security policies.

D.

Enforce passwords and data encryption on the devices.

Full Access
Question # 46

Labeling information according to its security classification:

A.

enhances the likelihood of people handling information securely.

B.

reduces the number and type of countermeasures required.

C.

reduces the need to identify baseline controls for each classification.

D.

affects the consequences if information is handled insecurely.

Full Access
Question # 47

A Seat a-hosting organization's data center houses servers, appli

BEST approach for developing a physical access control policy for the organization?

A.

Review customers’ security policies.

B.

Conduct a risk assessment to determine security risks and mitigating controls.

C.

Develop access control requirements for each system and application.

D.

Design single sign-on (SSO) or federated access.

Full Access
Question # 48

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

A.

Wipe and reset the endpoint device.

B.

Isolate the endpoint device.

C.

Power off the endpoint device.

D.

Run a virus scan on the endpoint device.

Full Access
Go to page: