Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

PDF CISM Study Guide

Page: 34 / 69
Total 920 questions

Certified Information Security Manager Questions and Answers

Question 133

Which of the following BEST supports effective communication during information security incidents7

Options:

A.

Frequent incident response training sessions

B.

Centralized control monitoring capabilities

C.

Responsibilities defined within role descriptions

D.

Predetermined service level agreements (SLAs)

Question 134

Which of the following should be the FIRST step in developing an information security strategy?

Options:

A.

Determine acceptable levels of information security risk

B.

Create a roadmap to identify security baselines and controls

C.

Perform a gap analysis based on the current state

D.

Identify key stakeholders to champion information security

Question 135

Threat and vulnerability assessments are important PRIMARILY because they are:

Options:

A.

used to establish security investments

B.

the basis for setting control objectives.

C.

elements of the organization's security posture.

D.

needed to estimate risk.

Question 136

What type of control is being implemented when a security information and event management (SIEM) system is installed?

Options:

A.

Preventive

B.

Deterrent

C.

Detective

D.

Corrective

Page: 34 / 69
Total 920 questions