Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISM Certified Information Security Manager is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISM Practice Questions

Certified Information Security Manager

Last Update 3 days ago
Total Questions : 1044

Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.

CISM PDF

CISM PDF (Printable)
$69.65
$199

CISM Testing Engine

CISM PDF (Printable)
$78.75
$225

CISM PDF + Testing Engine

CISM PDF (Printable)
$87.15
$249
Question # 221

Which of the following is the GREATEST benefit resulting from the introduction of data security standards for payment cards?

Options:

A.  

It helps achieve the holistic protection of information assets in the industry.

B.  

It deters hackers from committing crimes related to card payments.

C.  

It optimizes budget allocation for cybersecurity in each organization.

D.  

It enables a wider range of more sophisticated payment methods.

Discussion 0
Question # 222

Which of the following should be the PRIMARY goal of information security?

Options:

A.  

Information management

B.  

Regulatory compliance

C.  

Data governance

D.  

Business alignment

Discussion 0
Question # 223

Which of the following is established during the preparation phase of an incident response plan?

Options:

A.  

Recovery time objectives (RTOs)

B.  

Chain of custody procedures

C.  

Stakeholder communication plan

D.  

Mean time to respond (MTTR)

Discussion 0
Question # 224

A global organization is planning to expand its operations into a new country with stricter data protection regulations than those in the headquarters' home country. Which of the following is the BEST approach for adopting these new requirements?

Options:

A.  

Adjust organization-wide security polices to align with regulations of the new country.

B.  

Ensure local operations comply with geographical data protection laws of the headquarters.

C.  

Work with legal to interpret the local regulatory requirements and implement applicable controls.

D.  

Procure cybersecurity insurance that covers potential breaches and incidents in the new country.

Discussion 0
Question # 225

In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?

Options:

A.  

Ownership of security

B.  

Compliance with policies

C.  

Auditability of systems

D.  

Allocation of training resources

Discussion 0
Question # 226

Which of the following BEST enables users to recover from ransomware or malware attacks?

Options:

A.  

Incident response plans

B.  

Frequent system backups

C.  

Regular antivirus updates

D.  

End-user awareness training

Discussion 0
Question # 227

When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:

Options:

A.  

ensure alignment with industry encryption standards.

B.  

ensure that systems that handle credit card data are segmented.

C.  

review industry best practices for handling secure payments.

D.  

review corporate policies regarding credit card information.

Discussion 0
Question # 228

Which of the following is a function of the information security steering committee?

Options:

A.  

Deliver external communication during incident response.

B.  

Align the security framework with security standards.

C.  

Align security strategy with business objectives.

D.  

Monitor regulatory requirements.

Discussion 0
Question # 229

When establishing metrics for an information security program, the BEST approach is to identify indicators that:

Options:

A.  

reduce information security program spending.

B.  

support major information security initiatives.

C.  

reflect the corporate risk culture.

D.  

demonstrate the effectiveness of the security program.

Discussion 0
Question # 230

An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?

Options:

A.  

Perform a gap analysis.

B.  

Consult with senior management on the best course of action.

C.  

Implement a program of work to comply with the new legislation.

D.  

Understand the cost of noncompliance.

Discussion 0
Question # 231

For an e-business that requires high availability, which of the following design principles is BEST?

Options:

A.  

Manual failover to the website of another e-business that meets the user's needs

B.  

A single point of entry allowing transactions to be received and processed quickly

C.  

Intelligent middleware to direct transactions from a downed system to an alternative

D.  

Availability of an adjacent cold site and a standby server with mirrored copies of critical data

Discussion 0
Question # 232

An organization has been penalized by regulatory authorities for failing to notify them of a major security breach that may have compromised customer data. Which of the following is MOST likely in need of review and updating to prevent similar penalties in the future?

Options:

A.  

Information security policies and procedures

B.  

Business continuity plan (BCP)

C.  

Incident communication plan

D.  

Incident response training program

Discussion 0
Question # 233

Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?

Options:

A.  

Establishing risk metrics

B.  

Training on risk management procedures

C.  

Reporting on documented deficiencies

D.  

Assigning a risk owner

Discussion 0
Question # 234

An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?

Options:

A.  

The number of blocked external attacks is not representative of the true threat profile.

B.  

The number of blocked external attacks will vary by month, causing inconsistent graphs.

C.  

The number of blocked external attacks is an indicator of the organization's popularity.

D.  

The number of blocked external attacks over time does not explain the attackers' motivations.

Discussion 0
Question # 235

An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?

Options:

A.  

No owners were identified for some risks.

B.  

Business applications had the highest number of risks.

C.  

Risk mitigation action plans had no timelines.

D.  

Risk mitigation action plan milestones were delayed.

Discussion 0
Question # 236

Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?

Options:

A.  

Protection of business value and assets

B.  

Identification of core business strategiesC, Easier entrance into new businesses and technologies

C.  

Improved regulatory compliance posture

Discussion 0
Question # 237

The categorization of incidents is MOST important for evaluating which of the following?

Options:

A.  

Appropriate communication channels

B.  

Allocation of needed resources

C.  

Risk severity and incident priority

D.  

Response and containment requirements

Discussion 0
Question # 238

Which of the following should an information security manager do FIRST when noncompliance with security standards is identified?

Options:

A.  

Report the noncompliance to senior management.

B.  

Validate the noncompliance.

C.  

Include the noncompliance in the risk register.

D.  

Implement compensating controls to mitigate the noncompliance.

Discussion 0
Question # 239

Which of the following is MOST important to include in an information security status report management?

Options:

A.  

List of recent security events

B.  

Key risk indication (KRIs)

C.  

Review of information security policies

D.  

information security budget requests

Discussion 0
Question # 240

Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?

Options:

A.  

Residual risk

B.  

Regulatory requirements

C.  

Risk tolerance

D.  

Control objectives

Discussion 0
Get CISM dumps and pass your exam in 24 hours!

Free Exams Sample Questions