CISM Certified Information Security Manager – Question1489

Which of the following would be the BEST way for an information security manager to justify ongoing annual maintenance fees associated with an intrusion prevention system (IPS)?

A.
Perform a penetration test to demonstrate the ability to protect.
B. Perform industry research annually and document the overall ranking of the IPS.
C. Establish and present appropriate metrics that track performance.
D. Provide yearly competitive pricing to illustrate the value of the IPS.

Correct Answer: C

CISM Certified Information Security Manager – Question1486

When facilitating the alignment of corporate governance and information security governance, which of the following is the MOST important role of an organization's security steering committee?

A.
Obtaining support for the integration from business owners
B. Defining metrics to demonstrate alignment
C. Obtaining approval for the information security budget
D. Evaluating and reporting the degree of integration

Correct Answer: A

CISM Certified Information Security Manager – Question1485

To integrate security into system development life cycle (SDLC) processes, an organization MUST ensure that security:

A.
is represented on the configuration control board.
B. performance metrics have been met.
C. roles and responsibilities have been defined.
D. is a prerequisite for completion of major phases.

Correct Answer: D

CISM Certified Information Security Manager – Question1484

For an enterprise implementing a bring your own device (BYOD) program, which of the following would provide the BEST security of corporate data residing on unsecured mobile devices?

A.
Acceptable use policy
B. Device certification process
C. Containerization solution
D. Data loss prevention (DLP)

Correct Answer: D

CISM Certified Information Security Manager – Question1483

Which of the following is the BEST reason for reevaluating an information security program?

A.
Ineffectiveness of the information security strategy execution
B. Misalignment between information security priorities and business objectives
C. Change in senior management
D. Noncompliance with information security policies and procedures

Correct Answer: B

CISM Certified Information Security Manager – Question1482

The department head of application development has decided to accept the risks identified in a recent assessment. No recommendations will be implemented, even though the recommendations are required by regulatory oversight. What should the information security manager do NEXT?

A.
Formally document the decision.
B. Review the risk monitoring plan.
C. Perform a risk reassessment.
D. Implement the recommendations.

Correct Answer: A