CISM Certified Information Security Manager – Question0978

After an information security business case has been approved by senior management, it should be:

A.
used to design functional requirements for the solution.
B. used as the foundation for a risk assessment.
C. referenced to build architectural blueprints for the solution.
D. reviewed at key intervals to ensure intended outcomes.

Correct Answer: D

CISM Certified Information Security Manager – Question0977

A multinational organization wants to ensure its privacy program appropriately addresses privacy risk throughout its operations. Which of the following would be of MOST concern to senior management?

A.
The organization uses a decentralized privacy governance structure.
B. Privacy policies are only reviewed annually.
C. The organization does not have a dedicated privacy officer.
D. The privacy program does not include a formal training component.

Correct Answer: D

CISM Certified Information Security Manager – Question0976

A newly hired information security manager discovers that the cleanup of accounts for terminated employees happens only once a year. Which of the following should be the information security manager’s FIRST course of action?

A.
Design and document a new process.
B. Update the security policy.
C. Perform a risk assessment.
D. Report the issue to senior management.

Correct Answer: C

CISM Certified Information Security Manager – Question0971

Which of the following would be the BEST way for a company to reduce the risk of data loss resulting from employee-owned devices accessing the corporate email system?

A.
Link the bring-your-own-device (BYOD) policy to the existing staff disciplinary policy.
B. Require employees to undergo training before permitting access to the corporate email service.
C. Require employees to install a reputable mobile anti-virus solution on their personal devices.
D. Use a mobile device management (MDM) solution to isolate the local corporate email storage.

Correct Answer: D