Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CISM Leak Questions

Page: 22 / 69
Total 920 questions

Certified Information Security Manager Questions and Answers

Question 85

Which of the following BEST enables an organization to effectively manage emerging cyber risk?

Options:

A.

Periodic internal and external audits

B.

Clear lines of responsibility

C.

Sufficient cyber budget allocation

D.

Cybersecurity policies

Question 86

What should an information security manager verify FIRST when reviewing an information asset management program?

Options:

A.

System owners have been identified.

B.

Key applications have been secured.

C.

Information assets have been classified.

D.

Information assets have been inventoried.

Question 87

Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?

Options:

A.

Determine the final root cause of the incident.

B.

Remove all instances of the incident from the network.

C.

Mitigate exploited vulnerabilities to prevent future incidents.

D.

Isolate affected systems to prevent the spread of damage.

Question 88

How would the information security program BEST support the adoption of emerging technologies?

Options:

A.

Conducting a control assessment

B.

Developing an emerging technology roadmap

C.

Providing effective risk governance

D.

Developing an acceptable use policy

Page: 22 / 69
Total 920 questions