Question 1 of 20

0%

A newly appointed information security manager has been tasked with the development of an information security program. What should the first step be?

CISM Exam Study Guide

By Hemang Doshi

The responsibility of compliance with information security policies ultimately lies with:

CISM Exam Study Guide

By Hemang Doshi

What is the most important role of the chief information security officer?

CISM Exam Study Guide

By Hemang Doshi

What should the information security manager be most concerned about during the development of an information security strategy?

CISM Exam Study Guide

By Hemang Doshi

A security team has implemented a new web proxy solution. However, one of the business teams has complained that they are unable to access a critical application. What does this scenario best indicate?

CISM Exam Study Guide

By Hemang Doshi

A newly appointed information security manager observes that the information security steering committee does not have a representative from user management. What is their primary concern?

CISM Exam Study Guide

By Hemang Doshi

What should an information security manager develop first while implementing information security governance for an organization?

CISM Exam Study Guide

By Hemang Doshi

What is the most important function for an information security steering committee to perform?

CISM Exam Study Guide

By Hemang Doshi

Which of the following is the best indication of an effective governance program?

CISM Exam Study Guide

By Hemang Doshi

An information security manager notices that the system settings are inconsistent and vary across employee workstations. What does this best indicate?

CISM Exam Study Guide

By Hemang Doshi

What is the most important factor for the development of an IT balanced scorecard?

CISM Exam Study Guide

By Hemang Doshi

Which of the following is the best approach to implement security governance?

CISM Exam Study Guide

By Hemang Doshi

What is the most important reason for an information security manager to request a defense-in-depth approach to implementing security controls?

CISM Exam Study Guide

By Hemang Doshi

An information security manager is tasked with the development of a security policy. They should best align the policy with:

CISM Exam Study Guide

By Hemang Doshi

The operation teams of an organization need to deploy a critical user feature that violates the current security policy. What should the information security manager’s first step be?

CISM Exam Study Guide

By Hemang Doshi

The best approach for an information security manager to gain strong support for the information security program would be to:

CISM Exam Study Guide

By Hemang Doshi

What is the primary responsibility of the GRC function?

CISM Exam Study Guide

By Hemang Doshi

An information security manager is seeking additional budget for implementing a next-gen firewall. Which among the following would be the best approach to pursue to seek approval from senior management?

CISM Exam Study Guide

By Hemang Doshi

The best approach to promote a security-focused culture within an organization is to:

CISM Exam Study Guide

By Hemang Doshi

What is the best method to improve the effectiveness of an information security program?

CISM Exam Study Guide

By Hemang Doshi