CISM Certified Information Security Manager – Question1209

Which of the following is the MOST effective approach to communicate general information security responsibilities across an organization?

A.
Require staff to sign confidentiality agreements.
B. Develop a RACI matrix for the organization.
C. Specify information security responsibilities in job descriptions.
D. Provide regular security awareness training.

Correct Answer: B

CISM Certified Information Security Manager – Question1208

An organization is considering the purchase of a competitor. To determine the competitor's security posture, the BEST course of action for the organization's information security manager would be to:

A.
assess the security policy of the competitor.
B. assess the key technical controls of the competitor.
C. conduct a penetration test of the competitor.
D. perform a security gap analysis on the competitor.

Correct Answer: A

CISM Certified Information Security Manager – Question1207

An information security manager has been made aware that some employees are discussing confidential corporate business on social media sites. Which of the following is the BEST response to this situation?

A.
Communicate social media usage requirements and monitor compliance.
B. Block workplace access to social media sites and monitor employee usage.
C. Train employees how to set up privacy rules on social media sites.
D. Scan social media sites for company-related information.

Correct Answer: C

CISM Certified Information Security Manager – Question1206

Which of the following is the BEST reason to separate short-term from long-term plans within an information security roadmap?

A.
To allow for reactive initiatives
B. To update the roadmap according to current risks
C. To allocate resources for initiatives
D. To facilitate business plan reporting to management

Correct Answer: A

CISM Certified Information Security Manager – Question1205

The BEST way to ensure information security efforts and initiatives continue to support corporate strategy is by:

A.
including the CIO in the information security steering committee
B. conducting benchmarking with industry best practices
C. including information security metrics in the organizational metrics
D. performing periodic internal audits of the information security program

Correct Answer: A