CISM Practice Questions
Certified Information Security Manager
Last Update 3 days ago
Total Questions : 1044
Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.
Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.
Which of the following MUST be established to maintain an effective information security governance framework?
Which of the following is MOST important to consider when defining control objectives?
An organization is strategizing on how to improve security awareness. Which of the following is MOST important to consider when developing this strategy?
An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?
An organization faces severe fines and penalties if not in compliance with local regulatory requirements by an established deadline. Senior management has asked the information security manager to prepare an action plan to achieve compliance.
Which of the following would provide the MOST useful information for planning purposes? »
What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
An information security manager developing an incident response plan MUST ensure it includes:
Which of the following should be of GREATEST concern to an information security manager when evaluating a cloud service provider?
An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
An organization plans to offer clients a new service that is subject to regulations. What should the organization do FIRST when developing a security strategy in support of this new service?
Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
Which of the following is the GREATEST challenge when developing key risk indicators (KRIs)?
Which of the following provides an information security manager with the MOST useful information on new threats and emerging risks that could impact business objectives?
Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?
The PRIMARY consideration when responding to a ransomware attack should be to ensure:
Which of the following BEST determines the allocation of resources during a security incident response?
