Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISM Exam Dumps - Certified Information Security Manager

Go to page:
Question # 65

Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?

A.

Documentation of control procedures

B.

Standardization of compliance requirements

C.

Automation of controls

D.

Integration of assurance efforts

Full Access
Question # 66

Which of the following provides the BEST indication of the return on information security investment?

A.

Increased annualized loss expectancy (ALE)

B.

Increased number of reported incidents

C.

Reduced annualized loss expectancy (ALE)

D.

Decreased number of reported incidents

Full Access
Question # 67

An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?

A.

The benefit is greater than the potential risk.

B.

USB storage devices are enabled based on user roles.

C.

Users accept the risk of noncompliance.

D.

Access is restricted to read-only.

Full Access
Question # 68

Relationships between critical systems are BEST understood by

A.

evaluating key performance indicators (KPIs)

B.

performing a business impact analysis (BIA)

C.

developing a system classification scheme

D.

evaluating the recovery time objectives (RTOs)

Full Access
Question # 69

Which of the following is established during the preparation phase of an incident response plan?

A.

Recovery time objectives (RTOs)

B.

Chain of custody procedures

C.

Stakeholder communication plan

D.

Mean time to respond (MTTR)

Full Access
Question # 70

In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.

Before relying on this certification, it is MOST important that the information security manager confirms that the:

A.

current international standard was used to assess security processes.

B.

certification will remain current through the life of the contract.

C.

certification scope is relevant to the service being offered.

D.

certification can be extended to cover the client's business.

Full Access
Question # 71

Which of the following roles is MOST appropriate to determine access rights for specific users of an application?

A.

Data owner

B.

Data custodian

C.

System administrator

D.

Senior management

Full Access
Question # 72

Which of the following is BEST used to determine the maturity of an information security program?

A.

Security budget allocation

B.

Organizational risk appetite

C.

Risk assessment results

D.

Security metrics

Full Access
Go to page: