Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISM Certified Information Security Manager is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISM Practice Questions

Certified Information Security Manager

Last Update 3 days ago
Total Questions : 1044

Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.

CISM PDF

CISM PDF (Printable)
$69.65
$199

CISM Testing Engine

CISM PDF (Printable)
$78.75
$225

CISM PDF + Testing Engine

CISM PDF (Printable)
$87.15
$249
Question # 21

Which of the following is the MOST important reason for obtaining input from risk owners when implementing controls?

Options:

A.  

To reduce risk mitigation costs

B.  

To resolve vulnerabilities in enterprise architecture (EA)

C.  

To manage the risk to an acceptable level

D.  

To eliminate threats impacting the business

Discussion 0
Question # 22

An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?

Options:

A.  

Enforce the policy.

B.  

Modify the policy.

C.  

Present the risk to senior management.

D.  

Create an exception for the deviation.

Discussion 0
Question # 23

Which of the following is the MOST important input to the development of an effective information security strategy?

Options:

A.  

Risk and business impact assessments

B.  

Business processes and requirements

C.  

Current and desired state of security

D.  

Well-defined security policies and procedures

Discussion 0
Question # 24

Which of the following should an information security manager do FIRST when developing an organization's disaster recovery plan (DRP)?

Options:

A.  

Conduct a risk assessment.

B.  

Document disaster recovery procedures.

C.  

Identify business requirements.

D.  

Perform a business impact analysis (BIA).

Discussion 0
Question # 25

Which of the following should be an information security manager s MOST important consideration when determining the priority for implementing security controls?

Options:

A.  

Alignment with industry benchmarks

B.  

Results of business impact analyses (BIAs)

C.  

Possibility of reputational loss due to incidents

D.  

Availability of security budget

Discussion 0
Question # 26

Which of the following should be the PRIMARY objective when establishing a new information security program?

Options:

A.  

Executing the security strategy

B.  

Minimizing organizational risk

C.  

Optimizing resources

D.  

Facilitating operational security

Discussion 0
Question # 27

Which of the following will BEST facilitate timely and effective incident response?

Options:

A.  

Including penetration test results in incident response planning

B.  

Assessing the risk of compromised assets

C.  

Classifying the severity of an incident

D.  

Notifying stakeholders when invoking the incident response plan

Discussion 0
Question # 28

Which of the following would BEST mitigate accidental data loss events?

Options:

A.  

Conduct periodic user awareness training.

B.  

Obtain senior management support for the information security strategy.

C.  

Conduct a data loss prevention (DLP) audit.

D.  

Enforce a data hard drive encryption policy.

Discussion 0
Question # 29

Which of the following is necessary to ensure consistent protection for an organization's information assets?

Options:

A.  

Classification model

B.  

Control assessment

C.  

Data ownership

D.  

Regulatory requirements

Discussion 0
Question # 30

Which of the following is the MOST important consideration when briefing executives about the current state of the information security program?

Options:

A.  

Including a situational forecast

B.  

Using appropriate language for the target audience

C.  

Including trend charts for metrics

D.  

Using a rating system to demonstrate program effectiveness

Discussion 0
Question # 31

The PRIMARY goal to a post-incident review should be to:

Options:

A.  

identify policy changes to prevent a recurrence.

B.  

determine how to improve the incident handling process.

C.  

establish the cost of the incident to the business.

D.  

determine why the incident occurred.

Discussion 0
Question # 32

Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?

Options:

A.  

Internal security audit

B.  

External security audit

C.  

Organizational risk appetite

D.  

Business impact analysis (BIA)

Discussion 0
Question # 33

An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?

Options:

A.  

Conduct user awareness training within the IT function.

B.  

Propose that IT update information security policies and procedures.

C.  

Determine the risk related to noncompliance with the policy.

D.  

Request that internal audit conduct a review of the policy development process,

Discussion 0
Question # 34

Which of the following would MOST effectively ensure that a new server is appropriately secured?

Options:

A.  

Performing secure code reviews

B.  

Enforcing technical security standards

C.  

Conducting penetration testing

D.  

Initiating security scanning

Discussion 0
Question # 35

Which of the following is the GREATEST benefit of information asset classification?

Options:

A.  

Helping to determine the recovery point objective (RPO)

B.  

Providing a basis for implementing a need-to-know policy

C.  

Supporting segregation of duties

D.  

Defining resource ownership

Discussion 0
Question # 36

An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?

Options:

A.  

Notify senior management of the issue.

B.  

Report the issue to legal personnel.

C.  

Initiate contract renegotiation.

D.  

Assess the extent of the issue.

Discussion 0
Question # 37

Which type of backup BEST enables an organization to recover data after a ransomware attack?

Options:

A.  

Online backup

B.  

Incremental backup

C.  

Differential backup

D.  

Offline backup

Discussion 0
Question # 38

Which of the following BEST helps to ensure a third-party backup site continues to meet the organization’s information security standards?

Options:

A.  

Service level agreement (SLA)

B.  

Memorandum of understanding (MoU)

C.  

Business continuity plan (BCP)

D.  

Disaster recovery plan (DRP)

Discussion 0
Question # 39

What should be an information security manager's MOST important consideration when developing a multi-year plan?

Options:

A.  

Ensuring contingency plans are in place for potential information security risks

B.  

Ensuring alignment with the plans of other business units

C.  

Allowing the information security program to expand its capabilities

D.  

Demonstrating projected budget increases year after year

Discussion 0
Question # 40

An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?

Options:

A.  

Responsible entities

B.  

Key risk indicators (KRIS)

C.  

Compensating controls

D.  

Potential business impact

Discussion 0
Get CISM dumps and pass your exam in 24 hours!

Free Exams Sample Questions