Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISM Certified Information Security Manager is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISM Practice Questions

Certified Information Security Manager

Last Update 3 days ago
Total Questions : 1044

Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.

CISM PDF

CISM PDF (Printable)
$69.65
$199

CISM Testing Engine

CISM PDF (Printable)
$78.75
$225

CISM PDF + Testing Engine

CISM PDF (Printable)
$87.15
$249
Question # 201

Which of the following MUST be established to maintain an effective information security governance framework?

Options:

A.  

Security controls automation

B.  

Defined security metrics

C.  

Change management processes

D.  

Security policy provisions

Discussion 0
Question # 202

Which of the following is MOST important to consider when defining control objectives?

Options:

A.  

Industry best practices

B.  

An information security framework

C.  

Control recommendations from a recent audit

D.  

The organization's risk appetite

Discussion 0
Question # 203

An organization is strategizing on how to improve security awareness. Which of the following is MOST important to consider when developing this strategy?

Options:

A.  

Organizational maturity

B.  

Cost to implement

C.  

Organizational culture

D.  

Technical solutions for delivery

Discussion 0
Question # 204

An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?

Options:

A.  

Provide additional training to the incident response team.

B.  

Review the incident management procedures.

C.  

Interview the incident response team.

D.  

Remove the steps from the incident management procedures.

Discussion 0
Question # 205

An organization faces severe fines and penalties if not in compliance with local regulatory requirements by an established deadline. Senior management has asked the information security manager to prepare an action plan to achieve compliance.

Which of the following would provide the MOST useful information for planning purposes? »

Options:

A.  

Results from a business impact analysis (BIA)

B.  

Deadlines and penalties for noncompliance

C.  

Results from a gap analysis

D.  

An inventory of security controls currently in place

Discussion 0
Question # 206

What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?

Options:

A.  

Define the issues to be addressed.

B.  

Perform a cost-benefit analysis.

C.  

Calculate the total cost of ownership (TCO).

D.  

Conduct a feasibility study.

Discussion 0
Question # 207

During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?

Options:

A.  

Configuration management

B.  

Password management

C.  

Change management

D.  

Version management

Discussion 0
Question # 208

An information security manager developing an incident response plan MUST ensure it includes:

Options:

A.  

an inventory of critical data.

B.  

criteria for escalation.

C.  

a business impact analysis (BIA).

D.  

critical infrastructure diagrams.

Discussion 0
Question # 209

Which of the following should be of GREATEST concern to an information security manager when evaluating a cloud service provider?

Options:

A.  

Data retention policies are not documented

B.  

There is no right to audit the security of the provider

C.  

The provider is new to the market and lacks references

D.  

Security controls offered by the provider are inadequate

Discussion 0
Question # 210

An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?

Options:

A.  

Implementing automated vulnerability scanning in the help desk workflow

B.  

Changing the default setting for all security incidents to the highest priority

C.  

Integrating automated service level agreement (SLA) reporting into the help desk ticketing system

D.  

Integrating incident response workflow into the help desk ticketing system

Discussion 0
Question # 211

Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?

Options:

A.  

The risks are reported to the business unit’s senior management

B.  

The risks are escalated to the IT department for remediation

C.  

The risks are communicated to the central risk function

D.  

The risks are entered in the organization's risk register

Discussion 0
Question # 212

An organization plans to offer clients a new service that is subject to regulations. What should the organization do FIRST when developing a security strategy in support of this new service?

Options:

A.  

Determine security controls for the new service.

B.  

Establish a compliance program,

C.  

Perform a gap analysis against the current state

D.  

Hire new resources to support the service.

Discussion 0
Question # 213

Which of the following is PRIMARILY determined by asset classification?

Options:

A.  

Insurance coverage required for assets

B.  

Level of protection required for assets

C.  

Priority for asset replacement

D.  

Replacement cost of assets

Discussion 0
Question # 214

Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?

Options:

A.  

Information security manager

B.  

Chief risk officer (CRO)

C.  

Information security steering committee

D.  

Risk owner

Discussion 0
Question # 215

Which of the following is the GREATEST challenge when developing key risk indicators (KRIs)?

Options:

A.  

Limiting the number of KRIs

B.  

Comprehensively reporting on KRIs

C.  

Aggregating common KRIs

D.  

Linking KRIs to specific risks

Discussion 0
Question # 216

Which of the following provides an information security manager with the MOST useful information on new threats and emerging risks that could impact business objectives?

Options:

A.  

External audit report

B.  

Internal threat analysis report

C.  

Industry threat intelligence report

D.  

Internal vulnerability assessment report

Discussion 0
Question # 217

Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?

Options:

A.  

Risk assessment

B.  

Business impact analysis (BIA)

C.  

Penetration test results

D.  

Vulnerability scan results

Discussion 0
Question # 218

An incident response policy should include:

Options:

A.  

A description of testing methodology.

B.  

Notification requirements.

C.  

An infrastructure diagram.

D.  

Recovery time objectives (RTOs).

Discussion 0
Question # 219

The PRIMARY consideration when responding to a ransomware attack should be to ensure:

Options:

A.  

backups are available.

B.  

the most recent patches have been applied.

C.  

the ransomware attack is contained

D.  

the business can operate

Discussion 0
Question # 220

Which of the following BEST determines the allocation of resources during a security incident response?

Options:

A.  

Senior management commitment

B.  

A business continuity plan (BCP)

C.  

An established escalation process

D.  

Defined levels of severity

Discussion 0
Get CISM dumps and pass your exam in 24 hours!

Free Exams Sample Questions