CISM Practice Questions
Certified Information Security Manager
Last Update 3 days ago
Total Questions : 1044
Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.
Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.
While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?
As part of incident response activities, the BEST time to begin the recovery process is after:
To improve the efficiency of the development of a new software application, security requirements should be defined:
Which of the following components of an information security risk assessment is MOST valuable to senior management?
Which of the following should be the PRIMARY area of focus when mitigating security risks associated with emerging technologies?
A global organization is considering its geopolitical security risks. Which of the following is the information security manager's BEST approach?
Which of the following should be the MOST important consideration of business continuity management?
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?
Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
Which type of system is MOST effective for prioritizing cyber incidents based on impact and tracking them until they are closed?
Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
Which of the following is MOST important to consider when aligning a security awareness program with the organization's business strategy?
Which of the following would BEST ensure that security risk assessment is integrated into the life cycle of major IT projects?
Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
Which of the following is the PRIMARY role of the information security manager in application development?
