Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Ace Your CISM Isaca Certification Exam

Page: 5 / 70
Total 954 questions

Certified Information Security Manager Questions and Answers

Question 17

Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?

Options:

A.

Compromise of critical assets via third-party resources

B.

Unavailability of services provided by a supplier

C.

Loss of customers due to unavailability of products

D.

Unreliable delivery of hardware and software resources by a supplier

Question 18

Which of the following is an information security manager's MOST important course of action after receiving information about a new cybersecurity threat?

Options:

A.

Assess the impact of the new threat on the organization in the event of materialization.

B.

Update correlation rules for log monitoring to detect the possible emerging threat.

C.

Report the threat to senior management immediately to enable an informed decision.

D.

Review the enterprise architecture (EA) for vulnerabilities exploited by the threat.

Question 19

Which of the following has the GREATEST influence on an organization's information security strategy?

Options:

A.

The organization's risk tolerance

B.

The organizational structure

C.

Industry security standards

D.

Information security awareness

Question 20

Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?

Options:

A.

Security risk analysis

B.

Gap assessment

C.

Maturity assessment

D.

Vulnerability scan report

Page: 5 / 70
Total 954 questions