Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISM Certified Information Security Manager is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISM Practice Questions

Certified Information Security Manager

Last Update 3 days ago
Total Questions : 1044

Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.

CISM PDF

CISM PDF (Printable)
$69.65
$199

CISM Testing Engine

CISM PDF (Printable)
$78.75
$225

CISM PDF + Testing Engine

CISM PDF (Printable)
$87.15
$249
Question # 41

Which of the following tasks would provide a newly appointed information security manager with the BEST view of the organization's existing security posture?

Options:

A.  

Reviewing policies and procedures

B.  

Performing a risk assessment

C.  

Interviewing business managers and employees

D.  

Performing a business impact analysis (BIA)

Discussion 0
Question # 42

The MOST appropriate time to conduct a disaster recovery test would be after:

Options:

A.  

major business processes have been redesigned.

B.  

the business continuity plan (BCP) has been updated.

C.  

the security risk profile has been reviewed

D.  

noncompliance incidents have been filed.

Discussion 0
Question # 43

An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?

Options:

A.  

Wipe the affected system.

B.  

Notify internal legal counsel.

C.  

Notify senior management.

D.  

Isolate the impacted endpoints.

Discussion 0
Question # 44

Which of the following provides the BEST evidence that a newly implemented security awareness program has been effective?

Options:

A.  

Senior management supports funding for ongoing awareness training.

B.  

Employees from each department have completed the required training.

C.  

There has been an increase in the number of phishing attempts reported.

D.  

There have been no reported successful phishing attempts since the training started.

Discussion 0
Question # 45

What is the BEST way to reduce the impact of a successful ransomware attack?

Options:

A.  

Perform frequent backups and store them offline.

B.  

Purchase or renew cyber insurance policies.

C.  

Include provisions to pay ransoms ih the information security budget.

D.  

Monitor the network and provide alerts on intrusions.

Discussion 0
Question # 46

Which of the following will ensure confidentiality of content when accessing an email system over the Internet?

Options:

A.  

Multi-factor authentication

B.  

Digital encryption

C.  

Data masking

D.  

Digital signatures

Discussion 0
Question # 47

Which of the following should be the KEY consideration when creating an information security communication plan with industry peers?

Options:

A.  

Balancing the benefits of information sharing with the drawbacks of sharing sensitive information

B.  

Reducing the costs associated with information sharing by automating the process

C.  

Ensuring information is detailed enough to be of use to other organizations

D.  

Notifying the legal department whenever incident-related information is shared

Discussion 0
Question # 48

Which of the following is the MOST important function of an information security steering committee?

Options:

A.  

Assigning data classifications to organizational assets

B.  

Developing organizational risk assessment processes

C.  

Obtaining multiple perspectives from the business

D.  

Defining security standards for logical access controls

Discussion 0
Question # 49

Which of the following is the MOST effective defense against malicious insiders compromising confidential information?

Options:

A.  

Regular audits of access controls

B.  

Strong background checks when hiring staff

C.  

Prompt termination procedures

D.  

Role-based access control (RBAC)

Discussion 0
Question # 50

When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?

Options:

A.  

Business impact analysis (BIA) results

B.  

Vulnerability assessment results

C.  

The business continuity plan (BCP)

D.  

Recommendations from senior management

Discussion 0
Question # 51

After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?

Options:

A.  

EradicationB Recovery

B.  

Lessons learned review

C.  

Incident declaration

Discussion 0
Question # 52

Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?

Options:

A.  

Update the vendor risk assessment.

B.  

Engage legal counsel.

C.  

Renegotiate the vendor contract.

D.  

Terminate the relationship with the vendor.

Discussion 0
Question # 53

Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?

Options:

A.  

Recovery

B.  

Identification

C.  

Containment

D.  

Preparation

Discussion 0
Question # 54

Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?

Options:

A.  

Enhanced security monitoring and reporting

B.  

Reduced control complexity

C.  

Enhanced threat detection capability

D.  

Reduction of organizational risk

Discussion 0
Question # 55

In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or

Options:

A.  

Security budget

B.  

Risk register

C.  

Risk score

D.  

Laws and regulations

Discussion 0
Question # 56

Which of the following is the MOST effective way to identify changes in an information security environment?

Options:

A.  

Business impact analysis (BIA)

B.  

Annual risk assessments

C.  

Regular penetration testing

D.  

Continuous monitoring

Discussion 0
Question # 57

Which of the following is the BEST indication that an organization has a mature information security culture?

Options:

A.  

Information security training is mandatory for all staff.

B.  

The organization's information security policy is documented and communicated.

C.  

The chief information security officer (CISO) regularly interacts with the board.

D.  

Staff consistently consider risk in making decisions.

Discussion 0
Question # 58

Capacity planning would prevent:

Options:

A.  

file system overload arising from distributed denial of service (DDoS) attacks.

B.  

system downtime for scheduled security maintenance.

C.  

application failures arising from insufficient hardware resources.

D.  

software failures arising from exploitation of buffer capacity vulnerabilities.

Discussion 0
Question # 59

Which of the following is MOST important for the improvement of a business continuity plan (BCP)?

Options:

A.  

Incorporating lessons learned

B.  

Implementing an IT resilience solution

C.  

Implementing management reviews

D.  

Documenting critical business processes

Discussion 0
Question # 60

Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?

Options:

A.  

Documentation of control procedures

B.  

Standardization of compliance requirements

C.  

Automation of controls

D.  

Integration of assurance efforts

Discussion 0
Get CISM dumps and pass your exam in 24 hours!

Free Exams Sample Questions