Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISM Certified Information Security Manager is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISM Practice Questions

Certified Information Security Manager

Last Update 3 days ago
Total Questions : 1044

Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.

CISM PDF

CISM PDF (Printable)
$69.65
$199

CISM Testing Engine

CISM PDF (Printable)
$78.75
$225

CISM PDF + Testing Engine

CISM PDF (Printable)
$87.15
$249
Question # 181

Which of the following should be triggered FIRST when unknown malware has infected an organization's critical system?

Options:

A.  

Incident response plan

B.  

Disaster recovery plan (DRP)

C.  

Business continuity plan (BCP)

D.  

Vulnerability management plan

Discussion 0
Question # 182

Which of the following should be done FIRST to prioritize response to incidents?

Options:

A.  

Containment

B.  

Escalation

C.  

Analysis

D.  

Triage

Discussion 0
Question # 183

An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?

Options:

A.  

Recovery time objective (RTO)

B.  

Recovery point objective (RPO)

C.  

Maximum tolerable downtime (MTD)

D.  

Service level agreement (SLA)

Discussion 0
Question # 184

Which of the following is the MOST significant contributor to the success of incident response efforts during a major breach?

Options:

A.  

The incident response plan is aligned with the disaster recovery strategy

B.  

The incident response process is regularly tested

C.  

Incident response processes are documented and available to staff

D.  

The incident response plan clearly outlines roles and responsibilities

Discussion 0
Question # 185

In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?

Options:

A.  

Access to the hardware

B.  

Data encryption

C.  

Non-standard event logs

D.  

Compressed customer data

Discussion 0
Question # 186

Which of the following sources is MOST useful when planning a business-aligned information security program?

Options:

A.  

Security risk register

B.  

Information security policy

C.  

Business impact analysis (BIA)

D.  

Enterprise architecture (EA)

Discussion 0
Question # 187

Which of the following is the BEST way to build a risk-aware culture?

Options:

A.  

Periodically change risk awareness messages.

B.  

Ensure that threats are documented and communicated in a timely manner.

C.  

Establish a channel for staff to report risks.

D.  

Periodically test compliance with security controls.

Discussion 0
Question # 188

Which of the following is the MOST effective way to influence organizational culture to align with security guidelines?

Options:

A.  

Adhere to regulatory requirements

B.  

Conduct security awareness

C.  

Document and distribute security procedures

D.  

Communicate and enforce security policies

Discussion 0
Question # 189

To help ensure that an information security training program is MOST effective its contents should be

Options:

A.  

focused on information security policy.

B.  

aligned to business processes

C.  

based on employees' roles

D.  

based on recent incidents

Discussion 0
Question # 190

Which of the following is MOST important to include in security incident escalation procedures?

Options:

A.  

Key objectives of the security program

B.  

Recovery procedures

C.  

Notification criteria

D.  

Containment procedures

Discussion 0
Question # 191

Which of the following is the BEST way to prevent insider threats?

Options:

A.  

Enforce separation of duties and least privilege access.

B.  

Conduct organization-wide security awareness training.

C.  

Implement logging for all access activities.

D.  

Implement strict security policies and password controls.

Discussion 0
Question # 192

Management decisions concerning information security investments will be MOST effective when they are based on:

Options:

A.  

a process for identifying and analyzing threats and vulnerabilities.

B.  

an annual loss expectancy (ALE) determined from the history of security events,

C.  

the reporting of consistent and periodic assessments of risks.

D.  

the formalized acceptance of risk analysis by management,

Discussion 0
Question # 193

An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?

Options:

A.  

Guidelines

B.  

Policies

C.  

Procedures

D.  

Standards

Discussion 0
Question # 194

Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?

Options:

A.  

Demonstrating the program's value to the organization

B.  

Discussing governance programs found in similar organizations

C.  

Providing the results of external audits

D.  

Providing examples of information security incidents within the organization

Discussion 0
Question # 195

Which of the following is MOST important to emphasize when presenting information to gain senior management support for control enhancements?

Options:

A.  

Residual risk exposure

B.  

Threats against internal systems

C.  

Control gaps within defense-in-depth architecture

D.  

Recent data breaches in the same industry sector

Discussion 0
Question # 196

The PRIMARY objective of a post-incident review of an information security incident is to:

Options:

A.  

update the risk profile

B.  

minimize impact

C.  

prevent recurrence.

D.  

determine the impact

Discussion 0
Question # 197

The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:

Options:

A.  

scope of the business continuity program.

B.  

resources needed for business recovery.

C.  

recovery time objective (RTO).

D.  

scope of the incident response plan.

Discussion 0
Question # 198

Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?

Options:

A.  

Security risk assessments

B.  

Lessons learned analysis

C.  

Information security audits

D.  

Key performance indicators (KPIs)

Discussion 0
Question # 199

Which of the following is the PRIMARY responsibility of an information security governance committee?

Options:

A.  

Discussing upcoming information security projects

B.  

Reviewing the information security risk register

C.  

Approving changes to the information security strategy

D.  

Reviewing monthly information security metrics

Discussion 0
Question # 200

Which of the following should be established FIRST when implementing an information security governance framework?

Options:

A.  

Security architecture

B.  

Security policies

C.  

Security incident management team

D.  

Security awareness training program

Discussion 0
Get CISM dumps and pass your exam in 24 hours!

Free Exams Sample Questions