ISACA CISM Questions & Answers

Full Version: 1540 Q&A


CISM Dumps
CISM Braindumps
CISM Real Questions
CISM Practice Test
CISM dumps free



ISACA
CISM
Certified Information Security Manager (CISM)
http://killexams.com/pass4sure/exam-detail/CISM
Question #436 Topic 2
Inadvertent disclosure of internal business information on social media is BEST minimized by which of the
following?
A. Developing social media guidelines
B. Educating users on social media risks
C. Limiting access to social media sites
D. Implementing data loss prevention (DLP) solutions
Answer: D
Question #437 Topic 2
Which of the following is the MOST important security consideration when using Infrastructure as a Service
(IaaS)?
A. Backup and recovery strategy
B. Compliance with internal standards
C. User access management
D. Segmentation among tenants
Answer: C
Question #438 Topic 2
An external security audit has reported multiple instances of control noncompliance. Which of the following is
MOST important for the information security manager to communicate to senior management?
A. Control owner responses based on a root cause analysis
B. The impact of noncompliance on the organization's risk profile
C. An accountability report to initiate remediation activities
D. A plan for mitigating the risk due to noncompliance
Answer: B
Question #439 Topic 2
An information security manager has observed multiple exceptions for a number of different security controls.
Which of the following should be the information security manager's FIRST course of action?
A. Report the noncompliance to the board of directors.
B. Inform respective risk owners of the impact of exceptions
C. Design mitigating controls for the exceptions.
D. Prioritize the risk and implement treatment options.
Answer: D
Question #440 Topic 2
Which of the following models provides a client organization with the MOST administrative control over a cloud-
hosted environment?
A. Storage as a Service (SaaS)
B. Platform as a Service (PaaS)
C. Software as a Service (SaaS)
D. Infrastructure as a Service (IaaS)
Answer: D
Question #441 Topic 2
An information security manager has been made aware that some employees are discussing confidential corporate
business on social media sites.
Which of the following is the BEST response to this situation?
A. Communicate social media usage requirements and monitor compliance.
B. Block workplace access to social media sites and monitor employee usage.
C. Train employees how to set up privacy rules on social media sites.
D. Scan social media sites for company-related information.
Answer: C
Question #442 Topic 2
Which of the following is the BEST
indication that an information security control is no longer relevant?
A. Users regularly bypass or ignore the control.
B. The control does not support a specific business function.
C. IT management does not support the control.
D. Following the control costs the business more than not following it.
Answer: B
Question #443 Topic 2
Which of the following metrics provides the BEST indication of the effectiveness of a security awareness
campaign?
A. The number of reported security events
B. Quiz scores for users who took security awareness classes
C. User approval rating of security awareness classes
D. Percentage of users who have taken the courses
Answer: A
Question #444 Topic 2
An employee is found to be using an external cloud storage service to share corporate information with a third-
party consultant, which is against company policy.
Which of the following should be the information security manager's FIRST course of action?
A. Determine the classification level of the information.
B. Seek business justification from the employee.
C. Block access to the cloud storage service.
D. Inform higher management a security breach.
Answer: A
Question #445 Topic 2
When establishing classifications of security incidents for the development of an incident response plan, which of
the following provides the MOST valuable input?
A. Recommendations from senior management
B. The business continuity plan (BCP)
C. Business impact analysis (BIA) results
D. Vulnerability assessment results
Answer: C
Question #446 Topic 2
An information security manager has discovered a potential security breach in a server that supports a critical
business process. Which of the following should be the information security manager's FIRST course of action?
A. Shut down the server in an organized manner.
B. Validate that there has been an incident.
C. Inform senior management of the incident.
D. Notify the business process owner.
Answer: B
Question #447 Topic 2
An information security manager is reviewing the organization's incident response policy affected by a proposed
public cloud integration. Which of the following will be the MOST difficult to resolve with the cloud service
provider?
A. Accessing information security event data
B. Regular testing of incident response plan
C. Obtaining physical hardware for forensic analysis
D. Defining incidents and notification criteria
Answer: A
Question #448 Topic 2
The head of a department affected by a recent security incident expressed concern about not being aware of the
actions taken to resolve the incident. Which of the following is the BEST way to address this issue?
A. Ensure better identification of incidents in the incident response plan.
B. Discuss the definition of roles in the incident response plan.
C. Require management approval of the incident response plan.
D. Disseminate the incident response plan throughout the organization.
Answer: B
Question #449 Topic 2
The PRIMARY reason for implementing scenario-based training for incident response is to:
A. help incident response team members understand their assigned roles.
B. verify threats and vulnerabilities faced by the incident response team.
C. ensure staff knows where to report in the event evacuation is required.
D. assess the timeliness of the incident team response and remediation.
Answer: D
Question #450 Topic 2
What should an information security manager do FIRST when a service provider that stores the organization's
confidential customer data experiences a breach in its data center?
A. Engage an audit of the provider's data center.
B. Recommend canceling the outsourcing contract.
C. Apply remediation actions to counteract the breach.
D. Determine the impact of the breach.
Answer: D
Question #451 Topic 2
An organization was forced to pay a ransom to regain access to a critical database that had been encrypted in a
ransomware attack. What would have BEST prevented the need to make this ransom payment?
A. Storing backups on a segregated network
B. Training employees on ransomware
C. Ensuring all changes are approved
D. Verifying the firewall is configured properly
Answer: A
For More exams visit https://killexams.com/vendors-exam-list




Kill your exam at First Attempt....Guaranteed!

User: Tatyana*****

The thrill of passing the CISM exam with flying colors was unforgettable, and killexams.com’s perfect testprep materials made it possible. Their comprehensive practice tests eliminated any fear of failure, ensuring a confident performance. I encourage others to try their resources for a rewarding exam experience.
User: Diana*****

Discovering killexams.com’s testprep materials online before my CISM exam was a fortunate find. Their concise coaching and accurate exam simulator led to a strong score, and I am thankful for their cost-effective and reliable resources.
User: Maiya*****

A friend warned me that passing the CISM exam was nearly impossible, but Killexams.com proved them wrong. Their sample questions and updated practice tests covered all the essential topics, and I scored an impressive 87%. The challenging yet manageable questions prepared me thoroughly, and I highly recommend Killexams.com to anyone tackling this exam.
User: Melanie*****

To ensure my success in the cism exam, I relied on Killexams.com’s outstanding test prep materials. Their user-friendly resources and thorough evaluations of exam concepts addressed all my concerns, enabling me to pass with confidence. The practice tests were particularly valuable, and I am grateful for their contribution to my success.
User: Pedro*****

cism package was perfect for quick, reliable prep. Their exam simulator replicated the real test flawlessly, contributing to my 100% score.

Features of iPass4sure CISM Exam

  • Files: PDF / Test Engine
  • Premium Access
  • Online Test Engine
  • Instant download Access
  • Comprehensive Q&A
  • Success Rate
  • Real Questions
  • Updated Regularly
  • Portable Files
  • Unlimited Download
  • 100% Secured
  • Confidentiality: 100%
  • Success Guarantee: 100%
  • Any Hidden Cost: $0.00
  • Auto Recharge: No
  • Updates Intimation: by Email
  • Technical Support: Free
  • PDF Compatibility: Windows, Android, iOS, Linux
  • Test Engine Compatibility: Mac / Windows / Android / iOS / Linux

Premium PDF with 1540 Q&A

Get Full Version

All ISACA Exams

ISACA Exams

Certification and Entry Test Exams

Complete exam list