New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Ace Your CISM Isaca Certification Exam

Page: 5 / 59
Total 793 questions

Certified Information Security Manager Questions and Answers

Question 17

Of the following, whose input is of GREATEST importance in the development of an information security strategy?

Options:

A.

Process owners

B.

End users

C.

Security architects.

D.

Corporate auditors

Question 18

An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?

Options:

A.

Include security requirements in the contract

B.

Assess security controls.

C.

Perform a risk assessment

D.

Review data architecture.

Question 19

Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?

Options:

A.

Impact on information security program

B.

Cost of controls

C.

Impact to business function

D.

Cost to replace

Question 20

Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?

Options:

A.

Embedding compliance requirements within operational processes

B.

Engaging external experts to provide guidance on changes in compliance requirements

C.

Performing periodic audits for compliance with legal and regulatory requirements

D.

Assigning the operations manager accountability for meeting compliance requirements

Page: 5 / 59
Total 793 questions