CISM Demo
CISM Demo
Isaca CISM
Version Demo
https://dumpsboss.com
[email protected]
Topic Break Down
Total 1819
Which of the following is the MOST reliable source of information about emerging information security threats and
vulnerabilities?
A. Industry bloggers
ANSWER: C
QUESTION NO: 2
Which of the following BEST provides an information security manager with sufficient assurance that a service provider
complies with the organization's information security requirements?
ANSWER: C
QUESTION NO: 3
Which of the following is the BEST way to improve the timely reporting of information security incidents?
ANSWER: B
An organization is MOST at risk from a new worm being introduced through the intranet when:
ANSWER: A
QUESTION NO: 5
The service level agreement (SLA) for an outsourced IT function does not reflect an adequate level of protection. In this
situation an information security manager should:
ANSWER: D
Explanation:
It is important to ensure that adequate levels of protection are written into service level agreements (SLAs) and other
outsourcing contracts. Information must be obtained from providers to determine how that outsource provider is securing
information assets prior to making any recommendation or taking any action in order to support management decision
making. Choice A is not acceptable in most situations and therefore not a good answer.
QUESTION NO: 6
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence
activity?
C. Request that the service provider comply with information security policy.
QUESTION NO: 7
Which of the following is the BEST evidence that an organization's information security governance framework is effective?
ANSWER: A
QUESTION NO: 8
Which of the following would MOST effectively ensure that information security is implemented in a new system?
A. Security baselines
B. Security scanning
D. Penetration testing
ANSWER: D
QUESTION NO: 9
A. run continuously
B. ignore anomalies
ANSWER: A
Explanation:
QUESTION NO: 10
Executive leadership has decided to engage a consulting firm to develop and implement a comprehensive security
framework for the organization to allow senior management to remain focused on business priorities. Which of the following
poses the GREATEST challenge to the successful implementation of a new security governance framework?
A. Information security management does not fully accept the responsibility for information security governance.
B. Executive leadership views information security governance primarily as a concern of the information security
management team.
C. Information security staff has little or no experience with the practice of information security governance.
ANSWER: A
QUESTION NO: 11
Which of the following is the BEST way to identify the potential impact of a successful attack on an organization’s mission
critical applications?
ANSWER: A
QUESTION NO: 12
The BEST way to ensure that security settings on each platform are in compliance with information security policies and
procedures is to:
ANSWER: B
Explanation:
Security baselines will provide the best assurance that each platform meets minimum criteria. Penetration testing will not be
as effective and can only be performed periodically. Vendor default settings will not necessarily meet the criteria set by the
security policies, while linking policies to an independent standard will not provide assurance that the platforms meet these
levels of security.
QUESTION NO: 13
Which of the following should an information security manager establish FIRST to ensure security-related activities are
adequately monitored?
ANSWER: A
QUESTION NO: 14
The department head of application development has decided to accept the risks identified in a recent assessment. No
recommendations will be implemented, even though the recommendations are required by regulatory oversight. What should
the information security manager do NEXT?
ANSWER: A
QUESTION NO: 15
ANSWER: B
QUESTION NO: 16
An organization wants to ensure its confidential data is isolated in a multi-tenanted environment at a well-known cloud
service provider. Which of the following is the BEST way to ensure the data is adequately protected?
ANSWER: B
QUESTION NO: 17
The MOST important reason for an information security manager to be involved in the change management process is to
ensure that:
ANSWER: D
When implementing a new risk assessment methodology, which of the following is the MOST important requirement?
ANSWER: D
QUESTION NO: 19
Which of the following would be MOST important to consider when implementing security settings for a new system?
ANSWER: C
QUESTION NO: 20
Which of the following recovery approaches generally has the LOWEST periodic cost?
A. Redundant site
B. Reciprocal agreement
D. Cold site
ANSWER: D