CISM.pdf
Q: 1
A common drawback of email software packages that provide native encryption of messages is that
the encryption:
Options
Q: 2
An email digital signature will:
Options
Q: 3
Which of the following is the MOST important detail to capture in an organization's risk register?
Options
Q: 4
An organization's automated security monitoring tool generates an excessively large amount of falsq
positives. Which of the following is the BEST method to optimize the monitoring process?
Options
Q: 5
In a cloud technology environment, which of the following would pose the GREATEST challenge to
the investigation of security incidents?
Options
Q: 6
Which of the following is MOST important to have in place to help ensure an organization's
cybersecurity program meets the needs of the business?
Options
Q: 7
Which of the following is the MOST important consideration when determining which type of
failover site to employ?
Options
Q: 8
Which of the following should an information security manager do NEXT after creating a roadmap to
execute the strategy for an information security program?
Options
Q: 9
Which of the following is MOST appropriate for an organization to consider when defining incident
classification and categorization levels?
Options
Q: 10
When establishing metrics for an information security program, the BEST approach is to identify
indicators that:
Options
Question 1 of 10