Free ISACA CISM Exam Braindumps (page: 61)

Which of the following is the BEST way to ensure that organizational security policies comply with data security regulatory requirements?

  1. Obtain annual sign-off from executive management.
  2. Align the policies to the most stringent global regulations.
  3. Outsource compliance activities.
  4. Send the policies to stakeholders for review.

Answer(s): C



An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?

  1. Merge the two existing information security programs.
  2. Determine which country’s information security regulations will be used.
  3. Apply the existing information security program to the acquired company.
  4. Evaluate the information security laws that apply to the acquired company.

Answer(s): D



Which of the following should be done FIRST when establishing a new data protection program that must comply with applicable data privacy regulations?

  1. Create an inventory of systems where personal data is stored.
  2. Encrypt all personal data stored on systems and networks.
  3. Evaluate privacy technologies required for data protection.
  4. Update disciplinary processes to address privacy violations.

Answer(s): C



To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?

  1. Features of data protection products
  2. Data storage procedures
  3. Results of penetration testing
  4. Data classification policy

Answer(s): B



Viewing page 61 of 430
Viewing questions 301 - 305 out of 1716 questions



Post your Comments and Discuss ISACA CISM exam prep with other Community members:

CISM Exam Discussions & Posts