Certification Practice Test | PDF Questions | Actual Questions | Test Engine | Pass4Sure
CISM : Certified Information Security Manager (CISM) Exam

ISACA CISM Questions & Answers
Full Version: 1540 Q&A
Latest CIS-VRM Practice Tests with Actual Questions
Get Complete pool of questions with Premium PDF and Test Engine
Exam Code : CIS-VRM
Exam Name : ServiceNow Vendor Risk Management
Vendor Name :
"ServiceNow"
CISM Dumps CISM Braindumps
CISM Real Questions CISM Practice Test CISM dumps free
ISACA
CISM
Certified Information Security Manager (CISM)
https://killexams.com/pass4sure/exam-detail/CISM
Question #436 Topic 2
Inadvertent disclosure of internal business information on social media is BEST minimized by which of the following?
Developing social media guidelines
Educating users on social media risks
Limiting access to social media sites
Implementing data loss prevention (DLP) solutions
Answer: D
Question #437 Topic 2
Which of the following is the MOST important security consideration when using Infrastructure as a Service (IaaS)?
Backup and recovery strategy
Compliance with internal standards
User access management
Segmentation among tenants
Answer: C
Question #438 Topic 2
An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
Control owner responses based on a root cause analysis
The impact of noncompliance on the organization's risk profile
An accountability report to initiate remediation activities
A plan for mitigating the risk due to noncompliance
Answer: B
Question #439 Topic 2
An information security manager has observed multiple exceptions for a number of different security controls. Which of the following should be the information security manager's FIRST course of action?
Report the noncompliance to the board of directors.
Inform respective risk owners of the impact of exceptions
Design mitigating controls for the exceptions.
Prioritize the risk and implement treatment options.
Answer: D
Question #440 Topic 2
Which of the following models provides a client organization with the MOST administrative control over a cloud- hosted environment?
Storage as a Service (SaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Infrastructure as a Service (IaaS)
Answer: D
Question #441 Topic 2
An information security manager has been made aware that some employees are discussing confidential corporate business on social media sites.
Which of the following is the BEST response to this situation?
Communicate social media usage requirements and monitor compliance.
Block workplace access to social media sites and monitor employee usage.
Train employees how to set up privacy rules on social media sites.
Scan social media sites for company-related information.
Answer: C
Question #442 Topic 2
Which of the following is the BEST
indication that an information security control is no longer relevant?
Users regularly bypass or ignore the control.
The control does not support a specific business function.
IT management does not support the control.
Following the control costs the business more than not following it.
Answer: B
Question #443 Topic 2
Which of the following metrics provides the BEST indication of the effectiveness of a security awareness campaign?
The number of reported security events
Quiz scores for users who took security awareness classes
User approval rating of security awareness classes
Percentage of users who have taken the courses
Answer: A
Question #444 Topic 2
An employee is found to be using an external cloud storage service to share corporate information with a third- party consultant, which is against company policy.
Which of the following should be the information security manager's FIRST course of action?
Determine the classification level of the information.
Seek business justification from the employee.
Block access to the cloud storage service.
Inform higher management a security breach.
Answer: A
Question #445 Topic 2
When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?
Recommendations from senior management
The business continuity plan (BCP)
Business impact analysis (BIA) results
Question #446 Topic 2
An information security manager has discovered a potential security breach in a server that supports a critical business process. Which of the following should be the information security manager's FIRST course of action?
Shut down the server in an organized manner.
Validate that there has been an incident.
Inform senior management of the incident.
Notify the business process owner.
Answer: B
Question #447 Topic 2
An information security manager is reviewing the organization's incident response policy affected by a proposed public cloud integration. Which of the following will be the MOST difficult to resolve with the cloud service provider?
Accessing information security event data
Regular testing of incident response plan
Obtaining physical hardware for forensic analysis
Defining incidents and notification criteria
Answer: A
Question #448 Topic 2
The head of a department affected by a recent security incident expressed concern about not being aware of the actions taken to resolve the incident. Which of the following is the BEST way to address this issue?
Ensure better identification of incidents in the incident response plan.
Discuss the definition of roles in the incident response plan.
Require management approval of the incident response plan.
Disseminate the incident response plan throughout the organization.
Answer: B
Question #449 Topic 2
The PRIMARY reason for implementing scenario-based training for incident response is to:
help incident response team members understand their assigned roles.
verify threats and vulnerabilities faced by the incident response team.
ensure staff knows where to report in the event evacuation is required.
assess the timeliness of the incident team response and remediation.
Answer: D
Question #450 Topic 2
What should an information security manager do FIRST when a service provider that stores the organization's confidential customer data experiences a breach in its data center?
Engage an audit of the provider's data center.
Recommend canceling the outsourcing contract.
Apply remediation actions to counteract the breach.
Question #451 Topic 2
An organization was forced to pay a ransom to regain access to a critical database that had been encrypted in a ransomware attack. What would have BEST prevented the need to make this ransom payment?
Storing backups on a segregated network
Training employees on ransomware
Ensuring all changes are approved
Verifying the firewall is configured properly
Answer: A
User: Youssef*****![]() ![]() ![]() ![]() ![]() My preparation with killexams.com was a success - I answered 44 out of 50 questions correctly within 75 minutes. The comprehensive and affordable study materials were instrumental in my exam success, and I gained valuable knowledge through the process. |
User: Zorin*****![]() ![]() ![]() ![]() ![]() My preparation was in a disorganized condition when the cism exam was only one week away, and I expected that I would need to retake it in case of failure to get an 80% passing score. Following a colleagues recommendation, I bought the Questions and Answers from killexams.com and could take a moderate preparation by thoroughly studied material. The result was that I passed the cism exam with a score of 100%. |
User: Constance*****![]() ![]() ![]() ![]() ![]() The cism Questions and Answers provided by Killexams.com have been incredibly helpful to me during my certification exam. I am pleased with the results and plan to use their resources for future ISACA certifications. |
User: Vlad*****![]() ![]() ![]() ![]() ![]() I want to express my gratitude to Killexams.com for their invaluable support and resources as I prepared for my CISM exam. When I was researching the best certification resources, I found Killexams.com, and I am so glad I did. Their wealth of resources made it easy for me to prepare for the exam, and I felt confident and well-prepared when exam day arrived. Thanks to Killexams.com, I was able to pass the exam and achieve my certification. |
User: Verochka*****![]() ![]() ![]() ![]() ![]() Passing the cism exam with a score of 100% is a testimony to the quality of the exam simulator provided by killexams.com. The comprehensive exam preparatory material is an excellent way to score high on exams, and I am grateful to have had access to it. I have already recommended it to colleagues who also passed the cism exam, and I will definitely be back for my next certification. |
Features of iPass4sure CISM Exam
- Files: PDF / Test Engine
- Premium Access
- Online Test Engine
- Instant download Access
- Comprehensive Q&A
- Success Rate
- Real Questions
- Updated Regularly
- Portable Files
- Unlimited Download
- 100% Secured
- Confidentiality: 100%
- Success Guarantee: 100%
- Any Hidden Cost: $0.00
- Auto Recharge: No
- Updates Intimation: by Email
- Technical Support: Free
- PDF Compatibility: Windows, Android, iOS, Linux
- Test Engine Compatibility: Mac / Windows / Android / iOS / Linux
Premium PDF with 1540 Q&A
Get Full VersionAll ISACA Exams
ISACA ExamsCertification and Entry Test Exams
Complete exam list