CISM Certified Information Security Manager – Question1019

In the absence of technical controls, what would be the BEST way to reduce unauthorized text messaging on company-supplied mobile devices?

A.
Conduct a business impact analysis (BIA) and provide the report to management.
B. Update the corporate mobile usage policy to prohibit texting.
C. Stop providing mobile devices until the organization is able to implement controls.
D. Include the topic of prohibited texting in security awareness training.

Correct Answer: D

CISM Certified Information Security Manager – Question1018

Which of the following is the MOST effective way to ensure security policies are relevant to organizational business practices?

A.
Integrate industry best practices
B. Obtain senior management sign-off
C. Conduct an organization-wide security audit
D. Leverage security steering committee contribution

Correct Answer: D

CISM Certified Information Security Manager – Question1015

Which of the following is MOST useful to include in a report to senior management on a regular basis to demonstrate the effectiveness of the information security program?

A.
Key risk indicators (KRIs)
B. Capability maturity models
C. Critical success factors (CSFs)
D. Key performance indicators (KPIs)

Correct Answer: A

CISM Certified Information Security Manager – Question1013

An information security manager learns users of an application are frequently using emergency elevated access privileges to process transactions. Which of the following should be done FIRST?

A.
Request justification from the user’s managers for emergency access.
B. Request the application administrator block all emergency access profiles.
C. Update the frequency and usage of the emergency access profile in the policy.
D. Review the security architecture of the application and recommend changes.

Correct Answer: D

CISM Certified Information Security Manager – Question1011

Which of the following is the MOST important step when establishing guidelines for the use of social networking sites in an organization?

A.
Establish disciplinary actions for noncompliance.
B. Define acceptable information for posting.
C. Identity secure social networking sites.
D. Perform a vulnerability assessment.

Correct Answer: D

CISM Certified Information Security Manager – Question1010

An internal control audit has revealed a control deficiency related to a legacy system where the compensating controls no longer appear to be effective.
Which of the following would BEST help the information security manager determine the security requirements to resolve the control deficiency?

A.
Risk assessment
B. Gap analysis
C. Cost-benefit analysis
D. Business case

Correct Answer: B