Certified Information Security Manager
CISM Exam

When an organization hires a new information security manager, which of the following goals should this individual pursue FIRST?

  1. Develop a security architecture
  2. Establish good communication with steering committee members
  3. Assemble an experienced staff
  4. Benchmark peer organizations

Answer(s): B

Explanation:

New information security managers should seek to build rapport and establish lines of communication with senior management to enlist their support. Benchmarking peer organizations is beneficial to better understand industry best practices, but it is secondary to obtaining senior management support. Similarly, developing a security architecture and assembling an experienced staff are objectives that can be obtained later.



It is MOST important that information security architecture be aligned with which of the following?

  1. Industry best practices
  2. Information technology plans
  3. Information security best practices
  4. Business objectives and goals

Answer(s): D

Explanation:

Information security architecture should always be properly aligned with business goals and objectives. Alignment with IT plans or industry and security best practices is secondary by comparison.



Which of the following is MOST likely to be discretionary?

  1. Policies
  2. Procedures
  3. Guidelines
  4. Standards

Answer(s): C

Explanation:

Policies define security goals and expectations for an organization. These are defined in more specific terms within standards and procedures. Standards establish what is to be done while procedures describe how it is to be done. Guidelines provide recommendations that business management must consider in developing practices within their areas of control; as such, they are discretionary.



Security technologies should be selected PRIMARILY on the basis of their:

  1. ability to mitigate business risks.
  2. evaluations in trade publications.
  3. use of new and emerging technologies.
  4. benefits in comparison to their costs.

Answer(s): A

Explanation:

The most fundamental evaluation criterion for the appropriate selection of any security technology is its ability to reduce or eliminate business risks. Investments in security technologies should be based on their overall value in relation to their cost; the value can be demonstrated in terms of risk mitigation. This should take precedence over whether they use new or exotic technologies or how they are evaluated in trade publications.




950+
I just finished my exam this week. It was a good score of 950+.
- UNITED STATES
Upvote


Abdul
I passed the exam on Monday morning and was amazed at how much this site had covered, fortunately that's it for another three years. The tests really did help so thanks!!
- Doha
Upvote


Rose
I passed that exam the first time. And I thank you folks for that. I could not have passed it with out your help.
- South Africa
Upvote


Shourya
I've just done my exam and passed (890) - your materials are spot on.
- UNITED STATES
Upvote


90%
I have sat and passed.
- Haidarabad
Upvote


Jessica
Thanks to this site! i passed my 310-055 exam with 90%
- UNITED STATES
Upvote


George
I passed my VCP Exam this week with an 87. I hadn't taken a cert exam in 10 years. Your product was very helpful and helped me hone the areas where I was lacking. Thank you.
- UNITED ARAB EMIRATES
Upvote


David B.
I would like to thank this site for the great support and passing 920-105 exam with excellent result. Thanks once again!
- UNITED STATES
Upvote


Bruce Gord
Thanks Well I just passed the exam with high score. Anyway, thanks for providing the good material.
- Malaysia
Upvote


Parag
Hi, Let me appreciate your Study Guide. I passed the exam with 92%. All the questions were from the study guide. I am still wondering where I went wrong for not scoring 100%. I will not hesitate to recommend your site to my friends and colleagues. Thanks
- UNITED STATES
Upvote

Read more ...