CISM Practice Questions
Certified Information Security Manager
Last Update 3 days ago
Total Questions : 1044
Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.
Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.
Senior management has expressed concern that the organization's intrusion prevention system (IPS) may repeatedly disrupt business operations Which of the following BEST indicates that the information security manager has tuned the system to address this concern?
An organization wants to migrate a proprietary application to be hosted by a third-party cloud hosting provider using a Platform as a Service (PaaS) model. Prior to selecting the cloud provider, what is MOST important for the organization to ensure?
Which of the following roles is BEST suited to validate user access requirements during an annual user access review?
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
Which of the following activities is MOST appropriate to conduct during the eradication phase of a cyber incident response?
Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?
Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?
Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?
Which of the following is the BEST option to lower the cost to implement application security controls?
An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?
Which of the following should be the PRIMARY objective of the information security incident response process?
Which of the following is the MOST critical factor for information security program success?
The department head of application development has decided to accept the risks identified in a recent assessment. No recommendations will be implemented, even though the recommendations are required by regulatory oversight. What should the information security manager do NEXT?
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?
Which of the following would provide the BEST evidence to senior management that security control performance has improved?
An organization plans to leverage popular social network platforms to promote its products and services. Which of the following is the BEST course of action for the information security manager to support this initiative?
Which of the following MUST happen immediately following the identification of a malware incident?
Which of the following BEST supports investments in an information security program?
Which of the following is the MOST important role of the information security manager when the organization is in the process of adopting emerging technologies?
