Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISM Certified Information Security Manager is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISM Practice Questions

Certified Information Security Manager

Last Update 4 days ago
Total Questions : 1044

Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.

CISM PDF

CISM PDF (Printable)
$69.65
$199

CISM Testing Engine

CISM PDF (Printable)
$78.75
$225

CISM PDF + Testing Engine

CISM PDF (Printable)
$87.15
$249
Question # 281

Which type of plan is PRIMARILY intended to reduce the potential impact of security events that may occur?

Options:

A.  

Security awareness plan

B.  

Business continuity plan (BCP)

C.  

Disaster recovery plan (DRP)

D.  

Incident response plan

Discussion 0
Question # 282

Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?

Options:

A.  

Current resourcing levels

B.  

Availability of potential resources

C.  

Information security strategy

D.  

Information security incidents

Discussion 0
Question # 283

When taking a risk-based approach to vulnerability management, which of the following is MOST important to consider when prioritizing a vulnerability?

Options:

A.  

The information available about the vulnerability

B.  

The sensitivity of the asset and the data it contains

C.  

IT resource availability and constraints

D.  

Whether patches have been developed and tested

Discussion 0
Question # 284

In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:

Options:

A.  

evaluate results of the most recent incident response test.

B.  

review the number of reported security incidents.

C.  

ensure established security metrics are reported.

D.  

assess progress of risk mitigation efforts.

Discussion 0
Question # 285

When remote access is granted to a company's internal network, the MOST important consideration should be that access is provided:

Options:

A.  

on a need-to-know basis subject to controls.

B.  

subject to legal and regulatory requirements.

C.  

by the use of a remote access server.

D.  

if a robust IT infrastructure exists.

Discussion 0
Question # 286

Which of the following is the BEST indication of information security strategy alignment with the “&

Options:

A.  

Percentage of information security incidents resolved within defined service level agreements (SLAs)

B.  

Percentage of corporate budget allocated to information security initiatives

C.  

Number of business executives who have attended information security awareness sessions

D.  

Number of business objectives directly supported by information security initiatives

Discussion 0
Question # 287

Which of the following BEST enables an organization to continuously assess the information security risk posture?

Options:

A.  

Key risk indicators (KRIs)

B.  

Periodic review of the risk register

C.  

Degree of senior management support

D.  

Compliance with industry regulations

Discussion 0
Question # 288

Which of the following should be the FIRST step in developing an information security strategy?

Options:

A.  

Perform a gap analysis based on the current state

B.  

Create a roadmap to identify security baselines and controls.

C.  

Identify key stakeholders to champion information security.

D.  

Determine acceptable levels of information security risk.

Discussion 0
Question # 289

Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?

Options:

A.  

To ensure industry best practices for enterprise security are followed

B.  

To establish the minimum level of controls needed

C.  

To determine the desired state of enterprise security

D.  

To satisfy auditors' recommendations for enterprise security

Discussion 0
Question # 290

Which of the following is the PRIMARY objective of a business impact analysis (BIA)?

Options:

A.  

Determine recovery priorities.

B.  

Define the recovery point objective (RPO).

C.  

Confirm control effectiveness.

D.  

Analyze vulnerabilities.

Discussion 0
Question # 291

Which of the following tools would be MOST helpful to an incident response team?

Options:

A.  

Intrusion detection system (IDS)

B.  

Endpoint detection and response (EDR) solution

C.  

User and entity behavior analytics

D.  

Vulnerability scanning tools

Discussion 0
Question # 292

A business continuity plan (BCP) should contain:

Options:

A.  

Hardware and software inventories

B.  

Data restoration procedures

C.  

Information about eradication activities

D.  

Criteria for activation

Discussion 0
Question # 293

Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:

Options:

A.  

review access rights as the acquisition integration occurs.

B.  

perform a risk assessment of the access rights.

C.  

escalate concerns for conflicting access rights to management.

D.  

implement consistent access control standards.

Discussion 0
Question # 294

Which of the following has the GREATEST influence on the successful integration of information security within the business?

Options:

A.  

Organizational structure and culture

B.  

Risk tolerance and organizational objectives

C.  

The desired state of the organization

D.  

Information security personnel

Discussion 0
Question # 295

Which is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?

Options:

A.  

Parallel test

B.  

Full interruption test

C.  

Simulation test

D.  

Tabletop test

Discussion 0
Question # 296

Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?

Options:

A.  

Management's business goals and objectives

B.  

Strategies of other non-regulated companies

C.  

Risk assessment results

D.  

Industry best practices and control recommendations

Discussion 0
Question # 297

An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?

Options:

A.  

Data masking

B.  

Data retention strategy

C.  

Data encryption standards

D.  

Data loss prevention (DLP)

Discussion 0
Question # 298

What is the BEST way to inform senior management of the value of information security?

Options:

A.  

Present the benefits of security awareness training

B.  

Describe how security enables business objectives

C.  

Describe potential impact of compromises

D.  

Present anticipated return on security investment

Discussion 0
Question # 299

In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?

Options:

A.  

Maturity of the security policy

B.  

Clarity of security roles and responsibilities

C.  

Corporate culture

D.  

Corporate risk framework

Discussion 0
Question # 300

The fundamental purpose of establishing security metrics is to:

Options:

A.  

increase return on investment (ROI)

B.  

provide feedback on control effectiveness

C.  

adopt security best practices

D.  

establish security benchmarks

Discussion 0
Get CISM dumps and pass your exam in 24 hours!

Free Exams Sample Questions