100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISM SET 7 Practice Questions with Correct Answers

Rating
-
Sold
-
Pages
42
Grade
A+
Uploaded on
16-08-2024
Written in
2024/2025

CISM SET 7 Practice Questions with Correct Answers 601. Which of the following information security activities is MOST helpful to support compliance with information security policy? A. Conducting information security awareness programs B. Creating monthly trend metrics C. Performing periodic IT reviews on new system acquisitions D. Obtaining management commitment - Answer️️ -D. Obtaining management commitment 602. Which of the following is MOST important to determine following the discovery and eradication of a malware attack? A. The creator of the malware B. The malware entry path C. The type of malware involved D. The method of detecting the malware - Answer️️ -B. The malware entry path 603. Which of the following is MOST helpful in ensuring an information security governance framework continues to support business objectives? ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 2 A. A consistent risk assessment methodology B. A monitoring strategy C. An effective organizational structure D. Stakeholder buy-in - Answer️️ -D. Stakeholder buy-in 604. Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization? A. Managements business goals and objectives B. Strategies of other non-regulated companies C. Industry best practices and control recommendations D. Risk assessment results - Answer️️ -D. Risk assessment results 605. In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to: A. review the number of reported security incidents. B. evaluate results of the most recent incident response test. C. ensure established security metrics are reported. ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 3 D. assess progress of risk mitigation efforts. - Answer️️ -C. ensure established security metrics are reported 606. Information security controls should be designed PRIMARILY based on: A. regulatory requirements. B. a vulnerability assessment. C. business risk scenarios. D. a business impact analysis (BIA). - Answer️️ -C. business risk scenarios 607. An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on: A. risk assessment results. B. international security standards. C. the most stringent requirements. D. the security organization structure. - Answer️️ -C. the most stringent requirements 608. An information security manager developing an incident response plan MUST ensure it includes: ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 4 A. critical infrastructure diagrams. B. a business impact analysis (BIA). C. criteria for escalation. D. an inventory of critical data. - Answer️️ -C. criteria for escalation 609. Which of the following is the MOST effective way to help staff members understand their responsibilities for information security? A. Require staff to sign confidentiality agreements. B. Require staff to participate in information security awareness

Show more Read less
Institution
CISM
Course
CISM











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISM
Course
CISM

Document information

Uploaded on
August 16, 2024
Number of pages
42
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM



CISM SET 7 Practice Questions with Correct Answers

601. Which of the following information security activities is MOST helpful to

support compliance with information security policy?

A. Conducting information security awareness programs

B. Creating monthly trend metrics

C. Performing periodic IT reviews on new system acquisitions


D. Obtaining management commitment - Answer✔️✔️-D. Obtaining management

commitment

602. Which of the following is MOST important to determine following the

discovery and eradication of a malware attack?

A. The creator of the malware

B. The malware entry path

C. The type of malware involved


D. The method of detecting the malware - Answer✔️✔️-B. The malware entry path


603. Which of the following is MOST helpful in ensuring an information security

governance framework continues to support business objectives?



1

,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


A. A consistent risk assessment methodology

B. A monitoring strategy

C. An effective organizational structure


D. Stakeholder buy-in - Answer✔️✔️-D. Stakeholder buy-in


604. Reviewing which of the following would be MOST helpful when a new

information security manager is developing an information security strategy for a

non-regulated organization?

A. Managements business goals and objectives

B. Strategies of other non-regulated companies

C. Industry best practices and control recommendations


D. Risk assessment results - Answer✔️✔️-D. Risk assessment results


605. In order to understand an organization's security posture, it is MOST

important for an organization's senior leadership to:

A. review the number of reported security incidents.

B. evaluate results of the most recent incident response test.

C. ensure established security metrics are reported.




2

,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


D. assess progress of risk mitigation efforts. - Answer✔️✔️-C. ensure established

security metrics are reported

606. Information security controls should be designed PRIMARILY based on:

A. regulatory requirements.

B. a vulnerability assessment.

C. business risk scenarios.


D. a business impact analysis (BIA). - Answer✔️✔️-C. business risk scenarios


607. An organization involved in e-commerce activities operating from its home

country opened a new office in another country with stringent security laws. In this

scenario, the overall security strategy should be based on:

A. risk assessment results.

B. international security standards.

C. the most stringent requirements.


D. the security organization structure. - Answer✔️✔️-C. the most stringent

requirements

608. An information security manager developing an incident response plan MUST

ensure it includes:



3

, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


A. critical infrastructure diagrams.

B. a business impact analysis (BIA).

C. criteria for escalation.


D. an inventory of critical data. - Answer✔️✔️-C. criteria for escalation


609. Which of the following is the MOST effective way to help staff members

understand their responsibilities for information security?

A. Require staff to sign confidentiality agreements.

B. Require staff to participate in information security awareness training.

C. Communicate disciplinary processes for policy violations.


D. Include information security responsibilities in job descriptions. - Answer✔️✔️-

B. Require staff to participate in information security awareness training

610. Security program development is PRIMARILY driven by which of the

following?

A. Regulatory requirements

B. Business strategy

C. Risk appetite


D. Available resources - Answer✔️✔️-B. Business strategy


4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
OliviaWest Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
105
Member since
1 year
Number of followers
17
Documents
8528
Last sold
3 days ago
Pure Orchid Haven.

All Documents,and package deals offered by seller Olivia West.

2.8

22 reviews

5
6
4
2
3
4
2
1
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions