FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISM Exam
  4. ISACA.CISM.v2022-02-28.q183 Dumps
  • ««
  • «
  • …
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • …
  • »
  • »»
Download Now

Question 111

Which of the following BEST reduces the likelihood of leakage of private information via email?

Correct Answer: D
Section: INFORMATION SECURITY PROGRAM MANAGEMENT
insert code

Question 112

The MOST appropriate owner of customer data stored in a central database, used only by an organization's sales department, would be the:

Correct Answer: D
Explanation
The owner of the information asset should be the person with the decision-making power in the department deriving the most benefit from the asset. In this case, it would be the head of the sales department. The organizational unit cannot be the owner of the asset because that removes personal responsibility. The database administrator is a custodian. The chief information officer (CIO) would not be an owner of this database because the CIO is less likely to be knowledgeable about the specific needs of sales operations and security concerns.
insert code

Question 113

When personal information is transmitted across networks, there MUST be adequate controls over:

Correct Answer: B
Section: INFORMATION SECURITY GOVERNANCE
Explanation:
Privacy protection is necessary to ensure that the receiving party has the appropriate level of protection of personal data. Change management primarily protects only the information, not the privacy of the individuals.
Consent is one of the protections that is frequently, but not always, required. Encryption is a method of achieving the actual control, but controls over the devices may not ensure adequate privacy protection and, therefore, is a partial answer.
insert code

Question 114

To determine the selection of controls required to meet business objectives, an information security manager should:

Correct Answer: B
Section: INFORMATION RISK MANAGEMENT
Explanation:
Key controls primarily reduce risk and are most effective for the protection of information assets. The other choices could be examples of possible key controls.
insert code

Question 115

Senior management has decided to accept a significant risk within a security remediation plan.
Which of the following is the information security manager's BEST course of action?

Correct Answer: C
Section: INFORMATION RISK MANAGEMENT
insert code
  • ««
  • «
  • …
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISM.v2022-02-28.q183 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.