Top Renovate CISM exam guide Reviews!

Isaca CISM replies by Pass4sure save your valuable frequent classrooms instruction needs. You dont have that will burrow for Isaca CISM Braindumps also. Break free from appointed instruction timings as well as swing movement into your new trend connected with Pass4sure Exercise Checkups in your personal speed. If you ever youll find your checks using our own Pass4sure CISM, Youll be able to do well hard accreditations inside the initially endeavor.

2016 Dec CISM exam engine

Q121. Which of the following is the MOST appropriate frequency for updating antivirus signature files for antivirus software on production servers? 

A. Daily 

B. Weekly 

C. Concurrently with O/S patch updates 

D. During scheduled change control updates 

Answer:

Explanation: 

New viruses are being introduced almost daily. The effectiveness of virus detection software depends on frequent updates to its virus signatures, which are stored on antivirus signature files so updates may be carried out several times during the day. At a minimum, daily updating should occur. Patches may occur less frequently. Weekly updates may potentially allow new viruses to infect the system. 


Q122. The decision as to whether a risk has been reduced to an acceptable level should be 

determined by: 

A. organizational requirements. 

B. information systems requirements. 

C. information security requirements. 

D. international standards. 

Answer:

Explanation: 

Organizational requirements should determine when a risk has been reduced to an acceptable level. Information systems and information security should not make the ultimate determination. Since each organization is unique, international standards of best practice do not represent the best solution. 


Q123. Which of the following characteristics is MOST important when looking at prospective candidates for the role of chief information security officer (CISO)? 

A. Knowledge of information technology platforms, networks and development methodologies 

B. Ability to understand and map organizational needs to security technologies 

C. Knowledge of the regulatory environment and project management techniques 

D. Ability to manage a diverse group of individuals and resources across an organization 

Answer:

Explanation: 

Information security will be properly aligned with the goals of the business only with the ability to understand and map organizational needs to enable security technologies. All of the other choices are important but secondary to meeting business security needs. 


Q124. Which of the following would be of GREATEST importance to the security manager in determining whether to accept residual risk? 

A. Historical cost of the asset 

B. Acceptable level of potential business impacts 

C. Cost versus benefit of additional mitigating controls 

D. Annualized loss expectancy (ALE) 

Answer:

Explanation: 

The security manager would be most concerned with whether residual risk would be reduced by a greater amount than the cost of adding additional controls. The other choices, although relevant, would not be as important. 


Q125. The MOST effective approach to address issues that arise between IT management, business units and security management when implementing a new security strategy is for the information security manager to: 

A. escalate issues to an external third party for resolution. 

B. ensure that senior management provides authority for security to address the issues. 

C. insist that managers or units not in agreement with the security solution accept the risk. 

D. refer the issues to senior management along with any security recommendations. 

Answer:

Explanation: 

Senior management is in the best position to arbitrate since they will look at the overall needs of the business in reaching a decision. The authority may be delegated to others by senior management after their review of the issues and security recommendations. Units should not be asked to accept the risk without first receiving input from senior management. 


Updated CISM rapidshare:

Q126. When residual risk is minimized: 

A. acceptable risk is probable. 

B. transferred risk is acceptable. 

C. control risk is reduced. 

D. risk is transferable. 

Answer:

Explanation: 

Since residual risk is the risk that remains after putting into place an effective risk management program, it is probable that the organization will decide that it is an acceptable risk if sufficiently minimized. Transferred risk is risk that has been assumed by a third party, therefore its magnitude is not relevant. Accordingly, choices B and D are incorrect since transferred risk does not necessarily indicate whether risk is at an acceptable level. Minimizing residual risk will not reduce control risk. 


Q127. Investment in security technology and processes should be based on: 

A. clear alignment with the goals and objectives of the organization. 

B. success cases that have been experienced in previous projects. 

C. best business practices. 

D. safeguards that are inherent in existing technology. 

Answer:

Explanation: 

Organization maturity level for the protection of information is a clear alignment with goals and objectives of the organization. Experience in previous projects is dependent upon other business models which may not be applicable to the current model. Best business practices may not be applicable to the organization's business needs. Safeguards inherent to existing technology are low cost but may not address all business needs and/or goals of the organization. 


Q128. What would a security manager PRIMARILY utilize when proposing the implementation of a security solution? 

A. Risk assessment report 

B. Technical evaluation report 

C. Business case 

D. Budgetary requirements 

Answer:

Explanation: 

The information security manager needs to prioritize the controls based on risk management and the requirements of the organization. The information security manager must look at the costs of the various controls and compare them against the benefit the organization will receive from the security solution. The information security manager needs to have knowledge of the development of business cases to illustrate the costs and benefits of the various controls. All other choices are supplemental. 


Q129. In assessing risk, it is MOST essential to: 

A. provide equal coverage for all asset types. 

B. use benchmarking data from similar organizations. 

C. consider both monetary value and likelihood of loss. 

D. focus primarily on threats and recent business losses. 

Answer:

Explanation: 

A risk analysis should take into account the potential financial impact and likelihood of a loss. It should not weigh all potential losses evenly, nor should it focus primarily on recent losses or losses experienced by similar firms. Although this is important supplementary information, it does not reflect the organization's real situation. Geography and other factors come into play as well. 


Q130. Which of the following is the MOST important risk associated with middleware in a client-server environment? 

A. Server patching may be prevented 

B. System backups may be incomplete 

C. System integrity may be affected 

D. End-user sessions may be hijacked 

Answer:

Explanation: 

The major risk associated with middleware in a client-server environment is that system integrity may be adversely affected because of the very purpose of middleware, which is intended to support multiple operating environments interacting concurrently. Lack of proper software to control portability of data or programs across multiple platforms could result in a loss of data or program integrity. All other choices are less likely to occur. 



see more CISM dumps