Discount Offer
Go Back on CISM Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

CISM Practice Test


Page 17 out of 61 Pages

Topic 1: Exam Pool A

Which of the following information BEST supports risk management decision making?


A.

Average cost of risk events


B.

Results of a vulnerability assessment


C.

Estimated savings resulting from reduced risk exposure


D.

Quantification of threats through threat modeling





C.
  

Estimated savings resulting from reduced risk exposure



Which of the following roles is BEST suited to validate user access requirements during an
annual user access review?


A.

System administrator


B.

Access manager


C.

Business owner


D.

IT director





C.
  

Business owner



Which of the following is the PRIMARY responsibility of an information security steering
committee composed of management representation from business units?


A.

Perform business impact analyses (BIAS).


B.

Monitor the treatment of information security risk.


C.

Oversee the execution of the information security strategy


D.

Manage the implementation of the information security plan.





C.
  

Oversee the execution of the information security strategy



Which of the following is the MOST important security feature an information security
manager would need for a mobile device management (MDM) program?


A.

Ability to inventory devices


B.

Ability to remotely wipe devices


C.

Ability to locate devices


D.

Ability to push updates to devices





A.
  

Ability to inventory devices



The MAIN purpose of documenting information security guidelines for use within a large,
international organization is to:


A.

explain the organization's preferred practices for security


B.

ensure that all business units have the same strategic security goals


C.

ensure that all business units implement identical security procedures


D.

provide evidence for auditors that security practices are adequate





A.
  

explain the organization's preferred practices for security




Page 17 out of 61 Pages
Previous