Free ISACA CISM Exam Braindumps (page: 56)

During the establishment of a service level agreement (SLA) with a cloud service provider, it is MOST
important for the information security manager to:

  1. update the security policy to reflect the provider's terms of service.
  2. ensure security requirements are contractually enforceable.
  3. set up proper communication paths with the provider.
  4. understand the cloud storage architecture in use to determine security risk.

Answer(s): B



An outsourced vendor handles an organization's business-critical data.

Which of the following is the MOST effective way for the client organization to obtain assurance of the vendor's security practices?

  1. Verifying security certifications held by the vendor
  2. Reviewing the vendor's security audit reports
  3. Requiring periodic independent third-party reviews
  4. Requiring business continuity plans (BCPs) from the vendor

Answer(s): C



Which of the following is MOST important when carrying out a forensic examination of a laptop to determine an employee's involvement in a fraud?

  1. The employee's network access should be suspended.
  2. The laptop should not be removed from the company premises.
  3. An HR representative should be present during the laptop examination.
  4. The investigation should be conducted on an image of the original disk drive.

Answer(s): D



Which of the following is a PRIMARY responsibility of an information security steering committee?

  1. Reviewing the information security strategy
  2. Approving the information security awareness training strategy
  3. Analyzing information security policy compliance reviews
  4. Approving the purchase of information security technologies

Answer(s): A



Viewing page 56 of 430
Viewing questions 221 - 224 out of 1716 questions



Post your Comments and Discuss ISACA CISM exam prep with other Community members:

CISM Exam Discussions & Posts