Download Certified Information Security Manager.CISM.VCEplus.2025-01-28.237q.vcex

Vendor: Financial
Exam Code: CISM
Exam Name: Certified Information Security Manager
Date: Jan 28, 2025
File Size: 174 KB
Downloads: 5

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
  1. Intrusion detection
  2. Log monitoring
  3. Patch management
  4. Antivirus software
Correct answer: C
Question 2
Which of the following is the FIRST step to establishing an effective information security program?
  1. Conduct a compliance review.
  2. Assign accountability.
  3. Perform a business impact analysis (BIA). 
  4. Create a business case.
Correct answer: D
Question 3
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued.
Approval of risk acceptance should be provided by:
  1. the chief risk officer (CRO).
  2. business senior management.
  3. the information security manager.
  4. the compliance officer.
Correct answer: B
Question 4
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
  1. Disaster recovery plan (DRP)
  2. Incident response plan
  3. Business continuity plan (BCP)
  4. Business contingency plan
Correct answer: C
Question 5
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
  1. The time and location that the breach occurred
  2. Evidence of previous incidents caused by the user
  3. The underlying reason for the user error
  4. Appropriate disciplinary procedures for user error
Correct answer: C
Question 6
Which of the following is the BEST indicator of an organization's information security status?
  1. Intrusion detection log analysis
  2. Controls audit
  3. Threat analysis
  4. Penetration test 
Correct answer: B
Question 7
An organization recently outsourced the development of a mission-critical business application. 
Which of the following would be the BEST way to test for the existence of backdoors?
  1. Scan the entire application using a vulnerability scanning tool.
  2. Run the application from a high-privileged account on a test system.
  3. Perform security code reviews on the entire application.
  4. Monitor Internet traffic for sensitive information leakage.
Correct answer: C
Question 8
The PRIMARY benefit of introducing a single point of administration in network monitoring is that it:
  1. reduces unauthorized access to systems.
  2. promotes efficiency in control of the environment.
  3. prevents inconsistencies in information in the distributed environment.
  4. allows administrative staff to make management decisions.
Correct answer: D
Question 9
Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?
  1. Review the previous risk assessment and countermeasures.
  2. Perform a new risk assessment,
  3. Evaluate countermeasures to mitigate new risks.
  4. Transfer the new risk to a third party.
Correct answer: C
Question 10
Which of the following is the BEST indication of an effective information security awareness training program?
  1. An increase in the frequency of phishing tests
  2. An increase in positive user feedback
  3. An increase in the speed of incident resolution
  4. An increase in the identification rate during phishing simulations
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!