IT認証試験問題集
毎月、GOWUKAKUは1500人以上の受験者が試験準備を助けて、試験に合格するために受験者にご協力します
 ホームページ / CISM 問題集  / CISM 問題練習

ISACA CISM 問題練習

Certified Information Security Manager 試験

最新更新時間: 2024/04/10,合計1327問。

【2024桜まつりキャンペーン】:CISM 最新真題を買う時、日本語版と英語版両方を同時に獲得できます。

実際の問題集を練習し、試験のポイントを了解し、テストに申し込むするかどうかを決めることができます。

さらに試験準備時間の35%を節約するには、CISM 問題集を使用してください。

 / 7

Question No : 1
When developing a new application, which of the following is the BEST approach to ensure compliance with security requirements?

正解:

Question No : 2
Which of the following is MOST critical to review when preparing to outsource a data repository to a cloud-based solution?

正解:

Question No : 3
Due lo budget constraints, an internal IT application does not include the necessary controls to meet a client service level agreement (SLA).
Which of the following is the information security manager's BEST course of action?

正解:

Question No : 4
Which of the following will BEST help to ensure security is addressed when developing a custom application?

正解:

Question No : 5
Which of the following activities should take place FIRST when a security patch for Internet software is received from a vendor?

正解:

Question No : 6
The success of a computer forensic investigation depends on the concept of:

正解:

Question No : 7
Senior management has approved employees working off-site by using a virtual private network (VPN) connection.
It is MOST important for the information security manager to periodically:

正解:

Question No : 8
Which of the following metrics is MOST useful to demonstrate the effectiveness of an incident response plan?

正解:

Question No : 9
Executive management is considering outsourcing all IT operations.
Which of the following functions should remain internal?

正解:

Question No : 10
A multinational organization wants to ensure its privacy program appropriately addresses privacy risk throughout its operations.
Which of the following would be of MOST concern to senior management?

正解:

Question No : 11
Which of the following would provide nonrepudiation of electronic transactions?

正解:

Question No : 12
Which of the following is the MOST important outcome from vulnerability scanning?

正解:

Question No : 13
An information security manager is reviewing the impact of a regulation on the organization’s human resources system.
The NEXT course of action should be to:

正解:

Question No : 14
Which of the following is the MOST important driver when developing an effective information security strategy?

正解:

Question No : 15
After a server has been attacked, which of the following is the BEST course of action?

正解:

 / 7