Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISM Exam Dumps - Isaca Certification Questions and Answers

Question # 184

Which of the following is the BEST way lo monitor for advanced persistent threats (APT) in an organization?

Options:

A.

Network with peers in the industry to share information.

B.

Browse the Internet to team of potential events

C.

Search for anomalies in the environment

D.

Search for threat signatures in the environment.

Buy Now
Question # 185

Which of the following is the MOST important outcome of a post-incident review?

Options:

A.

The impact of the incident is reported to senior management.

B.

The system affected by the incident is restored to its prior state.

C.

The person responsible for the incident is identified.

D.

The root cause of the incident is determined.

Buy Now
Question # 186

Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?

Options:

A.

Decrease in false positives

B.

Increase in false positives

C.

Increase in false negatives

D.

Decrease in false negatives

Buy Now
Question # 187

Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?

Options:

A.

Compartmentalization

B.

Overlapping redundancy

C.

Continuous monitoring

D.

Multi-factor authentication

Buy Now
Question # 188

When establishing metrics for an information security program, the BEST approach is to identify indicators that:

Options:

A.

reduce information security program spending.

B.

support major information security initiatives.

C.

reflect the corporate risk culture.

D.

demonstrate the effectiveness of the security program.

Buy Now
Question # 189

When developing an incident escalation process, the BEST approach is to classify incidents based on:

Options:

A.

estimated time to recover.

B.

information assets affected.

C.

recovery point objectives (RPOs).

D.

their root causes.

Buy Now
Question # 190

Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?

Options:

A.

Alignment with financial reporting

B.

Alignment with business initiatives

C.

Alignment with industry frameworks

D.

Alignment with risk appetite

Buy Now
Question # 191

Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?

Options:

A.

Review compliance requirements.

B.

Communicate the exposure.

C.

Declare an incident.

D.

Change the encryption keys.

Buy Now
Question # 192

What should be the FIRST step when implementing data loss prevention (DLP) technology?

Options:

A.

Perform due diligence with vendor candidates.

B.

Build a business case.

C.

Classify the organization's data.

D.

Perform a cost-benefit analysis.

Buy Now
Question # 193

Which of the following would BEST mitigate accidental data loss events?

Options:

A.

Conduct periodic user awareness training.

B.

Obtain senior management support for the information security strategy.

C.

Conduct a data loss prevention (DLP) audit.

D.

Enforce a data hard drive encryption policy.

Buy Now
Question # 194

When developing a categorization method for security incidents, the categories MUST:

Options:

A.

align with industry standards.

B.

be created by the incident handler.

C.

have agreed-upon definitions.

D.

align with reporting requirements.

Buy Now
Question # 195

Which of the following BEST facilitates effective strategic alignment of security initiatives?

Options:

A.

The business strategy is periodically updated

B.

Procedures and standards are approved by department heads.

C.

Periodic security audits are conducted by a third-party.

D.

Organizational units contribute to and agree on priorities

Buy Now
Question # 196

Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:

Options:

A.

number of impacted users.

B.

capability of incident handlers.

C.

type of confirmed incident.

D.

predicted incident duration.

Buy Now
Question # 197

Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?

Options:

A.

Business impact analysis (BIA)

B.

Risk register

C.

Penetration testing

D.

Vulnerability assessment

Buy Now
Question # 198

Which of the following is MOST appropriate to communicate to senior management regarding information risk?

Options:

A.

Defined risk appetite

B.

Emerging security technologies

C.

Vulnerability scanning progress

D.

Risk profile changes

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Feb 23, 2025
Questions: 801
CISM pdf

CISM PDF

$59.7  $199
CISM Engine

CISM Testing Engine

$67.5  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$74.7  $249