New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CISM Reviews Questions

Page: 19 / 59
Total 793 questions

Certified Information Security Manager Questions and Answers

Question 73

Which of the following sources is MOST useful when planning a business-aligned information security program?

Options:

A.

Security risk register

B.

Information security policy

C.

Business impact analysis (BIA)

D.

Enterprise architecture (EA)

Question 74

Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?

Options:

A.

Security metrics

B.

Security baselines

C.

Security incident details

D.

Security risk exposure

Question 75

Reevaluation of risk is MOST critical when there is:

Options:

A.

resistance to the implementation of mitigating controls.

B.

a management request for updated security reports.

C.

a change in security policy.

D.

a change in the threat landscape.

Question 76

The fundamental purpose of establishing security metrics is to:

Options:

A.

increase return on investment (ROI)

B.

provide feedback on control effectiveness

C.

adopt security best practices

D.

establish security benchmarks

Page: 19 / 59
Total 793 questions