CISM Practice Questions
Certified Information Security Manager
Last Update 3 days ago
Total Questions : 1044
Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.
Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.
Which of the following should be triggered FIRST when unknown malware has infected an organization's critical system?
Which of the following should be done FIRST to prioritize response to incidents?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?
Which of the following is the MOST significant contributor to the success of incident response efforts during a major breach?
In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
Which of the following sources is MOST useful when planning a business-aligned information security program?
Which of the following is the MOST effective way to influence organizational culture to align with security guidelines?
To help ensure that an information security training program is MOST effective its contents should be
Which of the following is MOST important to include in security incident escalation procedures?
Management decisions concerning information security investments will be MOST effective when they are based on:
An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?
Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?
Which of the following is MOST important to emphasize when presenting information to gain senior management support for control enhancements?
The PRIMARY objective of a post-incident review of an information security incident is to:
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
Which of the following is the PRIMARY responsibility of an information security governance committee?
Which of the following should be established FIRST when implementing an information security governance framework?
