Free ISACA CISM Exam Braindumps (page: 83)

A large organization is considering a policy that would allow employees to bring their own smartphones into the organizational environment. The MOST important concern to the information security manager should be the:

  1. higher costs in supporting end users
  2. impact on network capacity
  3. decrease in end user productivity
  4. lack of a device management solution

Answer(s): D


Reference:

https://www.isaca.org/Journal/archives/2013/Volume-4/Pages/Leveraging-and-Securing-the-Bring-Your-Own-Device-and-Technology-Approach.aspx



Which of the following vulnerabilities presents the GREATEST risk of external hackers gaining access to the corporate network?

  1. Internal hosts running unnecessary services
  2. Inadequate logging
  3. Excessive administrative rights to an internal database
  4. Missing patches on a workstation

Answer(s): C



An information security manager has developed a strategy to address new information security risks resulting from recent changes in the business. Which of the following would be MOST important to include when presenting the strategy to senior management?

  1. The costs associated with business process changes
  2. Results of benchmarking against industry peers
  3. The impact of organizational changes on the security risk profile
  4. Security controls needed for risk mitigation

Answer(s): C



What is the BEST way to determine the level of risk associated with information assets processed by an IT application?

  1. Evaluate the potential value of information for an attacker
  2. Calculate the business value of the information assets
  3. Review the cost of acquiring the information assets for the business
  4. Research compliance requirements associated with the information

Answer(s): B






Post your Comments and Discuss ISACA CISM exam prep with other Community members:

CISM Exam Discussions & Posts