Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

New Release CISM Isaca Certification Questions

Page: 13 / 60
Total 801 questions

Certified Information Security Manager Questions and Answers

Question 49

For which of the following is it MOST important that system administrators be restricted to read-only access?

Options:

A.

User access log files

B.

Administrator user profiles

C.

Administrator log files

D.

System logging options

Question 50

Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?

Options:

A.

Risk assessment program

B.

Information security awareness training

C.

Information security governance

D.

Information security metrics

Question 51

Before approving the implementation of a new security solution, senior management requires a business case. Which of the following would BEST support the justification for investment?

Options:

A.

The solution contributes to business strategy.

B.

The solution improves business risk tolerance levels.

C.

The solution improves business resiliency.

D.

The solution reduces the cost of noncompliance with regulations.

Question 52

An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:

Options:

A.

a directory of approved local media contacts

B.

pre-prepared media statements

C.

procedures to contact law enforcement

D.

a single point of contact within the organization

Page: 13 / 60
Total 801 questions