Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISM Certified Information Security Manager is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISM Practice Questions

Certified Information Security Manager

Last Update 3 days ago
Total Questions : 1044

Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.

CISM PDF

CISM PDF (Printable)
$69.65
$199

CISM Testing Engine

CISM PDF (Printable)
$78.75
$225

CISM PDF + Testing Engine

CISM PDF (Printable)
$87.15
$249
Question # 241

Senior management has expressed concern that the organization's intrusion prevention system (IPS) may repeatedly disrupt business operations Which of the following BEST indicates that the information security manager has tuned the system to address this concern?

Options:

A.  

Increasing false negatives

B.  

Decreasing false negatives

C.  

Decreasing false positives

D.  

Increasing false positives

Discussion 0
Question # 242

An organization wants to migrate a proprietary application to be hosted by a third-party cloud hosting provider using a Platform as a Service (PaaS) model. Prior to selecting the cloud provider, what is MOST important for the organization to ensure?

Options:

A.  

The cloud provider can meet recovery point objectives (RPOs).

B.  

The cloud provider adheres to applicable regulations.

C.  

The cloud provider’s service level agreement (SLA) includes availability requirements.

D.  

The hosting contract has a termination clause.

Discussion 0
Question # 243

Which of the following roles is BEST suited to validate user access requirements during an annual user access review?

Options:

A.  

Access manager

B.  

IT director

C.  

System administrator

D.  

Business owner

Discussion 0
Question # 244

Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?

Options:

A.  

Impose state limits on servers.

B.  

Spread a site across multiple ISPs.

C.  

Block the attack at the source.

D.  

Harden network security.

Discussion 0
Question # 245

Which of the following activities is MOST appropriate to conduct during the eradication phase of a cyber incident response?

Options:

A.  

Restore affected systems for normal operations.

B.  

Mitigate exploited vulnerabilities to stop future incidents.

C.  

Estimate the amount of damage caused by the incident.

D.  

Isolate affected systems to prevent further damage

Discussion 0
Question # 246

Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?

Options:

A.  

Business impact analysis (BIA)

B.  

Risk register

C.  

Penetration testing

D.  

Vulnerability assessment

Discussion 0
Question # 247

Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?

Options:

A.  

Alignment with financial reporting

B.  

Alignment with business initiatives

C.  

Alignment with industry frameworks

D.  

Alignment with risk appetite

Discussion 0
Question # 248

Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?

Options:

A.  

IT system clocks are not synchronized with the centralized logging server.

B.  

Operating systems are no longer supported by the vendor.

C.  

The patch management system does not deploy patches in a timely manner.

D.  

An organization has a decentralized data center that uses cloud services.

Discussion 0
Question # 249

Which of the following is the BEST option to lower the cost to implement application security controls?

Options:

A.  

Perform security tests in the development environment.

B.  

Integrate security activities within the development process

C.  

Perform a risk analysis after project completion.

D.  

Include standard application security requirements

Discussion 0
Question # 250

An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?

Options:

A.  

Risk levels may be elevated beyond acceptable limits.

B.  

Security audits may report more high-risk findings.

C.  

The compensating controls may not be cost efficient.

D.  

Noncompliance with industry best practices may result.

Discussion 0
Question # 251

Which of the following should be the PRIMARY objective of the information security incident response process?

Options:

A.  

Conducting incident triage

B.  

Communicating with internal and external parties

C.  

Minimizing negative impact to critical operations

D.  

Classifying incidents

Discussion 0
Question # 252

Which of the following is the MOST critical factor for information security program success?

Options:

A.  

comprehensive risk assessment program for information security

B.  

The information security manager's knowledge of the business

C.  

Security staff with appropriate training and adequate resources

D.  

Ongoing audits and addressing open items

Discussion 0
Question # 253

The department head of application development has decided to accept the risks identified in a recent assessment. No recommendations will be implemented, even though the recommendations are required by regulatory oversight. What should the information security manager do NEXT?

Options:

A.  

Review the risk monitoring plan.

B.  

Formally document the decision.

C.  

Review the regulations.

D.  

Advise the risk management team.

Discussion 0
Question # 254

Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?

Options:

A.  

Decrease in the number of security incidents

B.  

Increase in the frequency of security incident escalations

C.  

Reduction in the impact of security incidents

D.  

Increase in the number of reported security incidents

Discussion 0
Question # 255

A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?

Options:

A.  

Security manager

B.  

Chief information security officer (CISO)

C.  

System administrator

D.  

Business owner

Discussion 0
Question # 256

Which of the following would provide the BEST evidence to senior management that security control performance has improved?

Options:

A.  

Demonstrated return on security investment

B.  

Reduction in inherent risk

C.  

Results of an emerging threat analysis

D.  

Review of security metrics trends

Discussion 0
Question # 257

An organization plans to leverage popular social network platforms to promote its products and services. Which of the following is the BEST course of action for the information security manager to support this initiative?

Options:

A.  

Establish processes to publish content on social networks.

B.  

Assess the security risk associated with the use of social networks.

C.  

Conduct vulnerability assessments on social network platforms.

D.  

Develop security controls for the use of social networks.

Discussion 0
Question # 258

Which of the following MUST happen immediately following the identification of a malware incident?

Options:

A.  

Preparation

B.  

Recovery

C.  

Containment

D.  

Eradication

Discussion 0
Question # 259

Which of the following BEST supports investments in an information security program?

Options:

A.  

Business cases

B.  

Business impact analysis (BIA)

C.  

Gap analysis results

D.  

Risk assessment results

Discussion 0
Question # 260

Which of the following is the MOST important role of the information security manager when the organization is in the process of adopting emerging technologies?

Options:

A.  

Assessing how peer organizations using the same technologies have been impacted

B.  

Understanding the impact on existing resources

C.  

Reviewing vendor contracts and service level agreements (SLAs)

D.  

Developing training for end users to familiarize them with the new technology

Discussion 0
Get CISM dumps and pass your exam in 24 hours!

Free Exams Sample Questions