CISM Certified Information Security Manager – Question1007

An information security manager learns of a new international standard related to information security.
Which of the following would be the BEST course of action?

A.
Review industry peers’ responses to the new standard.
B. Consult with legal counsel on the standard’s applicability to regulations.
C. Determine whether the organization can benefit from adopting the new standard.
D. Perform a gap analysis between the new standard and existing practices.

Correct Answer: C

CISM Certified Information Security Manager – Question1006

What would be an information security manager’s BEST course of action when notified that the implementation of some security controls is being delayed due to budget constraints?

A.
Prioritize security controls based on risk.
B. Request a budget exception for the security controls.
C. Begin the risk acceptance process.
D. Suggest less expensive alternative security controls.

Correct Answer: A

CISM Certified Information Security Manager – Question1005

An organization’s information security strategy for the coming year emphasizes reducing the risk of ransomware. Which of the following would be MOST helpful to support this strategy?

A.
Provide relevant training to all staff.
B. Create a penetration testing plan.
C. Perform a controls gap analysis.
D. Strengthen security controls for the IT environment.

Correct Answer: A

CISM Certified Information Security Manager – Question1002

Which of the following is the BEST way to increase the visibility of information security within an organization’s culture?

A.
Requiring cross-functional information security training
B. Implementing user awareness campaigns for the entire company
C. Publishing an acceptable use policy
D. Establishing security policies based on industry standards

Correct Answer: A

CISM Certified Information Security Manager – Question1000

The MAIN reason for an information security manager to monitor industry level changes in the business and IT is to:

A.
evaluate the effect of the changes on the levels of residual risk.
B. identify changes in the risk environment.
C. update information security policies in accordance with the changes.
D. change business objectives based on potential impact.

Correct Answer: B