Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISM Certified Information Security Manager is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISM Practice Questions

Certified Information Security Manager

Last Update 4 days ago
Total Questions : 1044

Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.

CISM PDF

CISM PDF (Printable)
$69.65
$199

CISM Testing Engine

CISM PDF (Printable)
$78.75
$225

CISM PDF + Testing Engine

CISM PDF (Printable)
$87.15
$249
Question # 301

Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?

Options:

A.  

Providing ongoing training to the incident response team

B.  

Implementing proactive systems monitoring

C.  

Implementing a honeypot environment

D.  

Updating information security awareness materials

Discussion 0
Question # 302

Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?

Options:

A.  

Revisit the business objective.

B.  

Escalate to senior management.

C.  

Perform a cost-benefit analysis.

D.  

Recommend risk acceptance.

Discussion 0
Question # 303

Which of the following is the BEST strategy when determining an organization's approach to risk treatment?

Options:

A.  

Implementing risk mitigation controls that are considered quick wins

B.  

Prioritizing controls that directly mitigate the organization's most critical risks

C.  

Advancing the maturity of existing controls based on risk tolerance

D.  

Implementing a one-size-fits-all set of controls across all organizational units

Discussion 0
Question # 304

What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?

Options:

A.  

Report the noncompliance to senior management.

B.  

Assess the risk of noncompliance.

C.  

Activate the incident response plan.

D.  

Evaluate possible compensating controls.

Discussion 0
Question # 305

Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?

Options:

A.  

Force password changes on the SQL database.

B.  

Reconfigure the web application firewall to block the attack.

C.  

Update the detection patterns on the web application firewall.

D.  

Block the IPs from where the attack originates.

Discussion 0
Question # 306

An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?

Options:

A.  

Refer the issue to internal audit for a recommendation.

B.  

Re-classify the data and increase the security level to meet business risk.

C.  

Instruct the relevant system owners to reclassify the data.

D.  

Complete a risk assessment and refer the results to the data owners.

Discussion 0
Question # 307

Which of the following would provide the MOST effective security outcome in an organizations contract management process?

Options:

A.  

Performing vendor security benchmark analyses at the request-for-proposal (RFP) stage

B.  

Ensuring security requirements are defined at the request-for-proposal (RFP) stage

C.  

Extending security assessment to cover asset disposal on contract termination

D.  

Extending security assessment to include random penetration testing

Discussion 0
Question # 308

Which of the following is the MOST important detail to capture in an organization's risk register?

Options:

A.  

Risk appetite

B.  

Risk severity level

C.  

Risk acceptance criteria

D.  

Risk ownership

Discussion 0
Get CISM dumps and pass your exam in 24 hours!

Free Exams Sample Questions