0% found this document useful (0 votes)
64 views9 pages

CISM Demo

Uploaded by

lucagnt.lavoro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views9 pages

CISM Demo

Uploaded by

lucagnt.lavoro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Certified Information Security Manager

Isaca CISM
Version Demo

Total Demo Questions: 20

Total Premium Questions: 1819


Buy Premium PDF

https://dumpsboss.com

[email protected]
Topic Break Down

Topic No. of Questions

Topic 1, INFORMATION SECURITY GOVERNANCE 256

Topic 2, INFORMATION RISK MANAGEMENT 284

Topic 3, INFORMATION SECURITY PROGRAM DEVELOPMENT 306

Topic 4, INFORMATION SECURITY PROGRAM MANAGEMENT 626

Topic 5, INCIDENT MANAGEMENT AND RESPONSE 347

Total 1819

DumpsBoss - Pass Your Next Certification Exam Fast!


dumpsboss.com
QUESTION NO: 1

Which of the following is the MOST reliable source of information about emerging information security threats and
vulnerabilities?

A. Industry bloggers

B. A social media group of hackers

C. Threat intelligence groups

D. Vulnerability scanning alerts

ANSWER: C

QUESTION NO: 2

Which of the following BEST provides an information security manager with sufficient assurance that a service provider
complies with the organization's information security requirements?

A. An independent review report indicating compliance with industry standards

B. A live demonstration of the third-party supplier's security capabilities

C. Third-party security control self-assessment results

D. The ability to audit the third-party supplier's IT systems and processes

ANSWER: C

QUESTION NO: 3

Which of the following is the BEST way to improve the timely reporting of information security incidents?

A. Perform periodic simulations with the incident response team

B. Integrate an intrusion detection system (IDS) in the DMZ

C. Incorporate security procedures in help desk processes

D. Regularly reassess and update the incident response plan

ANSWER: B

DumpsBoss - Pass Your Next Certification Exam Fast!


dumpsboss.com
QUESTION NO: 4

An organization is MOST at risk from a new worm being introduced through the intranet when:

A. desktop virus definition files are not up to date.

B. system software does not undergo integrity checks.

C. hosts have static IP addresses.

D. executable code is run from inside the firewall.

ANSWER: A

QUESTION NO: 5

The service level agreement (SLA) for an outsourced IT function does not reflect an adequate level of protection. In this
situation an information security manager should:

A. ensure the provider is made liable for losses.

B. recommend not renewing the contract upon expiration.

C. recommend the immediate termination of the contract.

D. determine the current level of security.

ANSWER: D

Explanation:

It is important to ensure that adequate levels of protection are written into service level agreements (SLAs) and other
outsourcing contracts. Information must be obtained from providers to determine how that outsource provider is securing
information assets prior to making any recommendation or taking any action in order to support management decision
making. Choice A is not acceptable in most situations and therefore not a good answer.

QUESTION NO: 6

To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence
activity?

A. Review samples of service level reports from the service provider.

B. Assess the level of security awareness of the service provider.

C. Request that the service provider comply with information security policy.

D. Review the security status of the service provider.

DumpsBoss - Pass Your Next Certification Exam Fast!


dumpsboss.com
ANSWER: C

QUESTION NO: 7

Which of the following is the BEST evidence that an organization's information security governance framework is effective?

A. Threats to the organization have diminished.

B. The risk register is reviewed annually.

C. The framework focuses primarily on technical controls.

D. The framework can adapt to organizational changes.

ANSWER: A

QUESTION NO: 8

Which of the following would MOST effectively ensure that information security is implemented in a new system?

A. Security baselines

B. Security scanning

C. Secure code reviews

D. Penetration testing

ANSWER: D

QUESTION NO: 9

An intrusion detection system (IDS) should:

A. run continuously

B. ignore anomalies

C. require a stable, rarely changed environment

D. be located on the network

ANSWER: A

Explanation:

DumpsBoss - Pass Your Next Certification Exam Fast!


dumpsboss.com
If an intrusion detection system (IDS) does not run continuously the business remains vulnerable. An IDS should detect, not
ignore anomalies. An IDS should be flexible enough to cope with a changing environment. Both host and network based IDS
are recommended for adequate detection.

QUESTION NO: 10

Executive leadership has decided to engage a consulting firm to develop and implement a comprehensive security
framework for the organization to allow senior management to remain focused on business priorities. Which of the following
poses the GREATEST challenge to the successful implementation of a new security governance framework?

A. Information security management does not fully accept the responsibility for information security governance.

B. Executive leadership views information security governance primarily as a concern of the information security
management team.

C. Information security staff has little or no experience with the practice of information security governance.

D. Executive leadership becomes involved in decisions about information security governance.

ANSWER: A

QUESTION NO: 11

Which of the following is the BEST way to identify the potential impact of a successful attack on an organization’s mission
critical applications?

A. Conduct penetration testing.

B. Execute regular vulnerability scans.

C. Perform independent code review.

D. Perform application vulnerability review.

ANSWER: A

QUESTION NO: 12

The BEST way to ensure that security settings on each platform are in compliance with information security policies and
procedures is to:

A. perform penetration testing.

B. establish security baselines.

C. implement vendor default settings.

DumpsBoss - Pass Your Next Certification Exam Fast!


dumpsboss.com
D. link policies to an independent standard.

ANSWER: B

Explanation:

Security baselines will provide the best assurance that each platform meets minimum criteria. Penetration testing will not be
as effective and can only be performed periodically. Vendor default settings will not necessarily meet the criteria set by the
security policies, while linking policies to an independent standard will not provide assurance that the platforms meet these
levels of security.

QUESTION NO: 13

Which of the following should an information security manager establish FIRST to ensure security-related activities are
adequately monitored?

A. Internal reporting channels

B. Accountability for security functions

C. Scheduled security assessments

D. Regular reviews of computer system logs

ANSWER: A

QUESTION NO: 14

The department head of application development has decided to accept the risks identified in a recent assessment. No
recommendations will be implemented, even though the recommendations are required by regulatory oversight. What should
the information security manager do NEXT?

A. Formally document the decision.

B. Review the risk monitoring plan.

C. Perform a risk reassessment.

D. Implement the recommendations.

ANSWER: A

QUESTION NO: 15

DumpsBoss - Pass Your Next Certification Exam Fast!


dumpsboss.com
Management has announced the acquisition of a new company. The information security manager of parent company is
concerned that conflicting access rights may cause critical information to be exposed during the integration of the two
companies.

To BEST address this concern, the information security manager should:

A. escalate concern for conflicting access rights to management.

B. implement consistent access control standards.

C. review access rights as the acquisition integration occurs.

D. perform a risk assessment of the access rights.

ANSWER: B

QUESTION NO: 16

An organization wants to ensure its confidential data is isolated in a multi-tenanted environment at a well-known cloud
service provider. Which of the following is the BEST way to ensure the data is adequately protected?

A. Obtain documentation of the encryption management practices.

B. Verify the provider follows a cloud service framework standard.

C. Ensure an audit of the provider is conducted to identify control gaps.

D. Review the provider's information security policies and procedures.

ANSWER: B

QUESTION NO: 17

The MOST important reason for an information security manager to be involved in the change management process is to
ensure that:

A. security controls are updated regularly.

B. potential vulnerabilities are identified.

C. risks have been evaluated.

D. security controls drive technology changes.

ANSWER: D

DumpsBoss - Pass Your Next Certification Exam Fast!


dumpsboss.com
QUESTION NO: 18

When implementing a new risk assessment methodology, which of the following is the MOST important requirement?

A. Risk assessments must be conducted by certified staff.

B. The methodology must be approved by the chief executive officer.

C. Risk assessments must be reviewed annually.

D. The methodology used must be consistent across the organization.

ANSWER: D

QUESTION NO: 19

Which of the following would be MOST important to consider when implementing security settings for a new system?

A. Results from internal and external audits

B. Government regulations and related penalties

C. Business objectives and related IT risk

D. Industry best practices applicable to the business

ANSWER: C

QUESTION NO: 20

Which of the following recovery approaches generally has the LOWEST periodic cost?

A. Redundant site

B. Reciprocal agreement

C. Shared contingency center

D. Cold site

ANSWER: D

DumpsBoss - Pass Your Next Certification Exam Fast!


dumpsboss.com

You might also like