What Does CISM download Mean?

CISM Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library!

Download CISM Dumps Free

Exambible offers free demo for CISM exam. "Certified Information Security Manager", also known as CISM exam, is a Isaca Certification. This set of posts, Passing the Isaca CISM exam, will help you answer those questions. The CISM Questions & Answers covers all the knowledge points of the real exam. 100% real Isaca CISM exams and revised by experts!

If you would certainly such as to recognize more concerning CISM exam, call us or merely visit us at our internet 2PASSEASY.COM site.

Q16. Which of the following is the MOST effective way to treat a risk such as a natural disaster that has a low probability and a high impact level? 

A. Implement countermeasures. 

B. Eliminate the risk. 

C. Transfer the risk. 

D. Accept the risk. 



Risks are typically transferred to insurance companies when the probability of an incident is low but the impact is high. Examples include: hurricanes, tornados and earthquakes. Implementing countermeasures may not be the most cost-effective approach to security management. Eliminating the risk may not be possible. Accepting the risk would leave the organization vulnerable to a catastrophic disaster which may cripple or ruin the organization. It would be more cost effective to pay recurring insurance costs than to be affected by a disaster from which the organization cannot financially recover. 

Q17. An organization has decided to implement additional security controls to treat the risks of a new process. This is an example of: 

A. eliminating the risk. 

B. transferring the risk. 

C. mitigating the risk. 

D. accepting the risk. 



Risk can never be eliminated entirely. Transferring the risk gives it away such as buying insurance so the insurance company can take the risk. Implementing additional controls is an example of mitigating risk. Doing nothing to mitigate the risk would be an example of accepting risk. 

Q18. When an organization is implementing an information security governance program, its board of directors should be responsible for: 

A. drafting information security policies. 

B. reviewing training and awareness programs. 

C. setting the strategic direction of the program. 

D. auditing for compliance. 



A board of directors should establish the strategic direction of the program to ensure that it is in sync with the company's vision and business goals. The board must incorporate the governance program into the overall corporate business strategy. Drafting information security policies is best fulfilled by someone such as a security manager with the expertise to bring balance, scope and focus to the policies. Reviewing training and awareness programs may best be handled by security management and training staff to ensure that the training is on point and follows best practices. Auditing for compliance is best left to the internal and external auditors to provide an objective review of the program and how it meets regulatory and statutory compliance. 

Q19. A security manager meeting the requirements for the international flow of personal data will need to ensure: 

A. a data processing agreement. 

B. a data protection registration. 

C. the agreement of the data subjects. 

D. subject access procedures. 



Whenever personal data are transferred across national boundaries, the awareness and agreement of the data subjects are required. Choices A, B and D are supplementary data protection requirements that are not key for international data transfer. 

Q20. Which of the following is the MOST appropriate frequency for updating antivirus signature files for antivirus software on production servers? 

A. Daily 

B. Weekly 

C. Concurrently with O/S patch updates 

D. During scheduled change control updates 



New viruses are being introduced almost daily. The effectiveness of virus detection software depends on frequent updates to its virus signatures, which are stored on antivirus signature files so updates may be carried out several times during the day. At a minimum, daily updating should occur. Patches may occur less frequently. Weekly updates may potentially allow new viruses to infect the system. 

Q21. The FIRST step to create an internal culture that focuses on information security is to: 

A. implement stronger controls. 

B. conduct periodic awareness training. 

C. actively monitor operations. 

D. gain the endorsement of executive management. 



Endorsement of executive management in the form of policies provides direction and awareness. The implementation of stronger controls may lead to circumvention. Awareness training is important, but must be based on policies. Actively monitoring operations will not affect culture at all levels. 

Q22. Which of the following is the MOST appropriate position to sponsor the design and implementation of a new security infrastructure in a large global enterprise? 

A. Chief security officer (CSO) 

B. Chief operating officer (COO) 

C. Chief privacy officer (CPO) 

D. Chief legal counsel (CLC) 



The chief operating officer (COO) is most knowledgeable of business operations and objectives. The chief privacy officer (CPO) and the chief legal counsel (CLC) may not have the knowledge of the day- to-day business operations to ensure proper guidance, although they have the same influence within the organization as the COO. Although the chief security officer (CSO) is knowledgeable of what is needed, the sponsor for this task should be someone with far-reaching influence across the organization. 

Q23. Before conducting a formal risk assessment of an organization's information resources, an information security manager should FIRST: 

A. map the major threats to business objectives. 

B. review available sources of risk information. 

C. identify the value of the critical assets. 

D. determine the financial impact if threats materialize. 



Risk mapping or a macro assessment of the major threats to the organization is a simple first step before performing a risk assessment. Compiling all available sources of risk information is part of the risk assessment. Choices C and D are also components of the risk assessment process, which are performed subsequent to the threats-business mapping. 

Q24. Which of the following is MOST important to the success of an information security program? 

A. Security' awareness training 

B. Achievable goals and objectives 

C. Senior management sponsorship 

D. Adequate start-up budget and staffing 



Sufficient senior management support is the most important factor for the success of an information security program. Security awareness training, although important, is secondary. Achievable goals and objectives as well as having adequate budgeting and staffing are important factors, but they will not ensure success if senior management support is not present. 

Q25. To ensure that payroll systems continue on in an event of a hurricane hitting a data center, what would be the FIRS T crucial step an information security manager would take in ensuring business continuity planning? 

A. Conducting a qualitative and quantitative risk analysis. 

B. Assigning value to the assets. 

C. Weighing the cost of implementing the plan vs. financial loss. 

D. Conducting a business impact analysis (BIA). 



BIA is an essential component of an organization's business continuity plan; it includes an exploratory component to reveal any vulnerabilities and a planning component to develop strategies for minimizing risk. It is the first crucial step in business continuity planning. Qualitative and quantitative risk analysis will have been completed to define the dangers to individuals, businesses and government agencies posed by potential natural and human-caused adverse events. Assigning value to assets is part of the BIA process. Weighing the cost of implementing the plan vs. financial loss is another part of the BIA. 

Q26. Which of the following BEST describes an information security manager's role in a multidisciplinary team that will address a new regulatory requirement regarding operational risk? 

A. Ensure that all IT risks are identified 

B. Evaluate the impact of information security risks 

C. Demonstrate that IT mitigating controls are in place 

D. Suggest new IT controls to mitigate operational risk 



The job of the information security officer on such a team is to assess the risks to the business operation. Choice A is incorrect because information security is not limited to IT issues. Choice C is incorrect because at the time a team is formed to assess risk, it is premature to assume that any demonstration of IT controls will mitigate business operations risk. Choice D is incorrect because it is premature at the time of the formation of the team to assume that any suggestion of new IT controls will mitigate business operational risk. 

Q27. Which of the following characteristics is MOST important when looking at prospective candidates for the role of chief information security officer (CISO)? 

A. Knowledge of information technology platforms, networks and development methodologies 

B. Ability to understand and map organizational needs to security technologies 

C. Knowledge of the regulatory environment and project management techniques 

D. Ability to manage a diverse group of individuals and resources across an organization 



Information security will be properly aligned with the goals of the business only with the ability to understand and map organizational needs to enable security technologies. All of the other choices are important but secondary to meeting business security needs. 

Q28. Which of the following situations would MOST inhibit the effective implementation of security governance: 

A. The complexity of technology 

B. Budgetary constraints 

C. Conflicting business priorities 

D. High-level sponsorship 



The need for senior management involvement and support is a key success factor for the implementation of appropriate security governance. Complexity of technology, budgetary constraints and conflicting business priorities are realities that should be factored into the governance model of the organization, and should not be regarded as inhibitors. 

Q29. Senior management commitment and support for information security will BEST be attained by an information security manager by emphasizing: 

A. organizational risk. 

B. organization wide metrics. 

C. security needs. 

D. the responsibilities of organizational units. 



Information security exists to help the organization meet its objectives. The information security manager should identify information security needs based on organizational needs. Organizational or business risk should always take precedence. Involving each organizational unit in information security and establishing metrics to measure success will be viewed favorably by senior management after the overall organizational risk is identified. 

Q30. A security manager is preparing a report to obtain the commitment of executive management to a security program. Inclusion of which of the following would be of MOST value? 

A. Examples of genuine incidents at similar organizations 

B. Statement of generally accepted best practices 

C. Associating realistic threats to corporate objectives 

D. Analysis of current technological exposures 



Linking realistic threats to key business objectives will direct executive attention to them. All other options are supportive but not of as great a value as choice C when trying to obtain the funds for a new program.