Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Isaca Certification CISM Exam Dumps

Page: 32 / 73
Total 967 questions

Certified Information Security Manager Questions and Answers

Question 125

Which of the following control types should be considered FIRST for aligning employee behavior with an organization's information security objectives?

Options:

A.

Administrative security controls

B.

Technical security controls

C.

Physical security controls

D.

Access security controls

Question 126

The PRIMARY purpose for deploying information security metrics is to:

Options:

A.

compare program effectiveness to benchmarks.

B.

support ongoing security budget requirements.

C.

ensure that technical operations meet specifications.

D.

provide information needed to make decisions.

Question 127

Which of the following would be the BEST way to reduce the risk of disruption resulting from an emergency system change?

Options:

A.

Confirm the change implementation is scheduled.

B.

Verify the change request has been approved.

C.

Confirm rollback plans are in place.

D.

Notify users affected by the change.

Question 128

Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?

Options:

A.

Isolate the PC from the network

B.

Perform a vulnerability scan

C.

Determine why the PC is not included in the inventory

D.

Reinforce information security training

Page: 32 / 73
Total 967 questions