Certification Practice Test | PDF Questions | Actual Questions | Test Engine | Pass4Sure
CISM : Certified Information Security Manager (CISM) Exam

ISACA CISM Questions & Answers
Full Version: 1540 Q&A
CISM Dumps
CISM Braindumps
CISM Real Questions
CISM Practice Test
CISM dumps free
ISACA
CISM
Certified Information Security Manager (CISM)
http://killexams.com/pass4sure/exam-detail/CISM
Question #436 Topic 2
Inadvertent disclosure of internal business information on social media is BEST minimized by which of the
following?
A. Developing social media guidelines
B. Educating users on social media risks
C. Limiting access to social media sites
D. Implementing data loss prevention (DLP) solutions
Answer: D
Question #437 Topic 2
Which of the following is the MOST important security consideration when using Infrastructure as a Service
(IaaS)?
A. Backup and recovery strategy
B. Compliance with internal standards
C. User access management
D. Segmentation among tenants
Answer: C
Question #438 Topic 2
An external security audit has reported multiple instances of control noncompliance. Which of the following is
MOST important for the information security manager to communicate to senior management?
A. Control owner responses based on a root cause analysis
B. The impact of noncompliance on the organization's risk profile
C. An accountability report to initiate remediation activities
D. A plan for mitigating the risk due to noncompliance
Answer: B
Question #439 Topic 2
An information security manager has observed multiple exceptions for a number of different security controls.
Which of the following should be the information security manager's FIRST course of action?
A. Report the noncompliance to the board of directors.
B. Inform respective risk owners of the impact of exceptions
C. Design mitigating controls for the exceptions.
D. Prioritize the risk and implement treatment options.
Answer: D
Question #440 Topic 2
Which of the following models provides a client organization with the MOST administrative control over a cloud-
hosted environment?
A. Storage as a Service (SaaS)
B. Platform as a Service (PaaS)
C. Software as a Service (SaaS)
D. Infrastructure as a Service (IaaS)
Answer: D
Question #441 Topic 2
An information security manager has been made aware that some employees are discussing confidential corporate
business on social media sites.
Which of the following is the BEST response to this situation?
A. Communicate social media usage requirements and monitor compliance.
B. Block workplace access to social media sites and monitor employee usage.
C. Train employees how to set up privacy rules on social media sites.
D. Scan social media sites for company-related information.
Answer: C
Question #442 Topic 2
Which of the following is the BEST
indication that an information security control is no longer relevant?
A. Users regularly bypass or ignore the control.
B. The control does not support a specific business function.
C. IT management does not support the control.
D. Following the control costs the business more than not following it.
Answer: B
Question #443 Topic 2
Which of the following metrics provides the BEST indication of the effectiveness of a security awareness
campaign?
A. The number of reported security events
B. Quiz scores for users who took security awareness classes
C. User approval rating of security awareness classes
D. Percentage of users who have taken the courses
Answer: A
Question #444 Topic 2
An employee is found to be using an external cloud storage service to share corporate information with a third-
party consultant, which is against company policy.
Which of the following should be the information security manager's FIRST course of action?
A. Determine the classification level of the information.
B. Seek business justification from the employee.
C. Block access to the cloud storage service.
D. Inform higher management a security breach.
Answer: A
Question #445 Topic 2
When establishing classifications of security incidents for the development of an incident response plan, which of
the following provides the MOST valuable input?
A. Recommendations from senior management
B. The business continuity plan (BCP)
C. Business impact analysis (BIA) results
D. Vulnerability assessment results
Answer: C
Question #446 Topic 2
An information security manager has discovered a potential security breach in a server that supports a critical
business process. Which of the following should be the information security manager's FIRST course of action?
A. Shut down the server in an organized manner.
B. Validate that there has been an incident.
C. Inform senior management of the incident.
D. Notify the business process owner.
Answer: B
Question #447 Topic 2
An information security manager is reviewing the organization's incident response policy affected by a proposed
public cloud integration. Which of the following will be the MOST difficult to resolve with the cloud service
provider?
A. Accessing information security event data
B. Regular testing of incident response plan
C. Obtaining physical hardware for forensic analysis
D. Defining incidents and notification criteria
Answer: A
Question #448 Topic 2
The head of a department affected by a recent security incident expressed concern about not being aware of the
actions taken to resolve the incident. Which of the following is the BEST way to address this issue?
A. Ensure better identification of incidents in the incident response plan.
B. Discuss the definition of roles in the incident response plan.
C. Require management approval of the incident response plan.
D. Disseminate the incident response plan throughout the organization.
Answer: B
Question #449 Topic 2
The PRIMARY reason for implementing scenario-based training for incident response is to:
A. help incident response team members understand their assigned roles.
B. verify threats and vulnerabilities faced by the incident response team.
C. ensure staff knows where to report in the event evacuation is required.
D. assess the timeliness of the incident team response and remediation.
Answer: D
Question #450 Topic 2
What should an information security manager do FIRST when a service provider that stores the organization's
confidential customer data experiences a breach in its data center?
A. Engage an audit of the provider's data center.
B. Recommend canceling the outsourcing contract.
C. Apply remediation actions to counteract the breach.
D. Determine the impact of the breach.
Answer: D
Question #451 Topic 2
An organization was forced to pay a ransom to regain access to a critical database that had been encrypted in a
ransomware attack. What would have BEST prevented the need to make this ransom payment?
A. Storing backups on a segregated network
B. Training employees on ransomware
C. Ensuring all changes are approved
D. Verifying the firewall is configured properly
Answer: A
For More exams visit https://killexams.com/vendors-exam-list
Kill your exam at First Attempt....Guaranteed!
User: Una*****![]() ![]() ![]() ![]() ![]() I am grateful to have discovered Killexams.com online study materials just days before my cism exam. The coaching provided was concise and effective, and the exam simulator accurately reflected the types of questions and content that were on the exam. While some may question the value of paying for a practice test, I can attest that this one was well worth every penny. I passed the exam with a strong score, and I credit Killexams.com study materials for my success. |
User: Kate*****![]() ![]() ![]() ![]() ![]() This was the first time I used killexams.com for my cism exam training, so I did not know what to expect. I was pleasantly surprised as killexams.com surpassed my expectations. The exam simulator and practice exams were top-notch, and the questions were valid. By valid, I mean that they were real exam questions, and I had many of them on my actual exam. I highly recommend killexams.com to my colleagues. |
User: Ben*****![]() ![]() ![]() ![]() ![]() Thanks to the Killexams.com set, I passed the cism exam after a few days of preparation. The correct questions and answers in the bundle made things a lot easier, and I got a score higher than I had hoped for. I am relieved to have left the exam behind but happy to have found Killexams.com. |
User: Vera*****![]() ![]() ![]() ![]() ![]() As someone who had dreamed of a career in CISM, I struggled to find the time and motivation to study for my certification. However, the CISM Questions and Answers provided by Killexams.com made my exam preparation realistic and convenient. The exam simulator was as good as advertised, and I was able to study while driving to work. The accurate questions and convenient format helped me get my dream certification. |
User: Natalie*****![]() ![]() ![]() ![]() ![]() I am grateful to killexams.com for providing me with a mock test for the cism exam. Thanks to this mock test, I passed the exam without any trouble. I have also taken mock tests for other exams, and I find them very beneficial. I am confident of passing this exam by scoring more than 91%. The question bank is very helpful, and the explanations are superb. I give it a 4-star rating. |
Features of iPass4sure CISM Exam
- Files: PDF / Test Engine
- Premium Access
- Online Test Engine
- Instant download Access
- Comprehensive Q&A
- Success Rate
- Real Questions
- Updated Regularly
- Portable Files
- Unlimited Download
- 100% Secured
- Confidentiality: 100%
- Success Guarantee: 100%
- Any Hidden Cost: $0.00
- Auto Recharge: No
- Updates Intimation: by Email
- Technical Support: Free
- PDF Compatibility: Windows, Android, iOS, Linux
- Test Engine Compatibility: Mac / Windows / Android / iOS / Linux
Premium PDF with 1540 Q&A
Get Full VersionAll ISACA Exams
ISACA ExamsCertification and Entry Test Exams
Complete exam list