Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISM Exam Dumps - Isaca Certification Questions and Answers

Question # 169

While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?

Options:

A.

The test is scheduled to reduce operational impact.

B.

The test involves IT members in the test process.

C.

The test addresses the critical components.

D.

The test simulates actual prime-time processing conditions.

Buy Now
Question # 170

When remote access is granted to a company's internal network, the MOST important consideration should be that access is provided:

Options:

A.

on a need-to-know basis subject to controls.

B.

subject to legal and regulatory requirements.

C.

by the use of a remote access server.

D.

if a robust IT infrastructure exists.

Buy Now
Question # 171

An organization is considering the feasibility of implementing a big data solution to analyze customer data. In order to support this initiative, the information security manager should FIRST:

Options:

A.

inventory sensitive customer data to be processed by the solution.

B.

determine information security resource and budget requirements.

C.

assess potential information security risk to the organization.

D.

develop information security requirements for the big data solution.

Buy Now
Question # 172

Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?

Options:

A.

Conduct a business impact analysis (BIA)

B.

Identify the response and recovery learns.

C.

Review the communications plan.

D.

Develop response and recovery strategies.

Buy Now
Question # 173

Which of the following should be done FIRST once a cybersecurity attack has been confirmed?

Options:

A.

Isolate the affected system.

B.

Notify senior management.

C.

Power down the system.

D.

Contact legal authorities.

Buy Now
Question # 174

Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?

Options:

A.

Execution of unauthorized commands

B.

Prevention of authorized access

C.

Defacement of website content

D.

Unauthorized access to resources

Buy Now
Question # 175

Recommendations for enterprise investment in security technology should be PRIMARILY based on:

Options:

A.

adherence to international standards

B.

availability of financial resources

C.

the organization s risk tolerance

D.

alignment with business needs

Buy Now
Question # 176

Which of the following is a PRIMARY function of an incident response team?

Options:

A.

To provide effective incident mitigation

B.

To provide a risk assessment for zero-day vulnerabilities

C.

To provide a single point of contact for critical incidents

D.

To provide a business impact analysis (BIA)

Buy Now
Question # 177

Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?

Options:

A.

Information security manager

B.

Chief risk officer (CRO)

C.

Information security steering committee

D.

Risk owner

Buy Now
Question # 178

Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?

Options:

A.

Service level agreement (SLA)

B.

Business continuity plan (BCP)

C.

Disaster recovery plan (DRP)

D.

Business impact analysis (BIA)

Buy Now
Question # 179

An email digital signature will:

Options:

A.

protect the confidentiality of an email message.

B.

verify to recipient the integrity of an email message.

C.

automatically correct unauthorized modification of an email message.

D.

prevent unauthorized modification of an email message.

Buy Now
Question # 180

What is the role of the information security manager in finalizing contract negotiations with service providers?

Options:

A.

To perform a risk analysis on the outsourcing process

B.

To obtain a security standard certification from the provider

C.

To update security standards for the outsourced process

D.

To ensure that clauses for periodic audits are included

Buy Now
Question # 181

Which of the following is the MOST important issue in a penetration test?

Options:

A.

Having an independent group perform the test

B.

Obtaining permission from audit

C.

Performing the test without the benefit of any insider knowledge

D.

Having a defined goal as well as success and failure criteria

Buy Now
Question # 182

Which of the following is MOST helpful in determining whether a phishing email is malicious?

Options:

A.

Security awareness training

B.

Reverse engineering

C.

Threat intelligence

D.

Sandboxing

Buy Now
Question # 183

When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?

Options:

A.

Business impact analysis (BIA) results

B.

Vulnerability assessment results

C.

The business continuity plan (BCP)

D.

Recommendations from senior management

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Feb 23, 2025
Questions: 801
CISM pdf

CISM PDF

$59.7  $199
CISM Engine

CISM Testing Engine

$67.5  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$74.7  $249