Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISM Certified Information Security Manager is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISM Practice Questions

Certified Information Security Manager

Last Update 3 days ago
Total Questions : 1044

Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.

CISM PDF

CISM PDF (Printable)
$69.65
$199

CISM Testing Engine

CISM PDF (Printable)
$78.75
$225

CISM PDF + Testing Engine

CISM PDF (Printable)
$87.15
$249
Question # 61

Which of the following is the MOST important consideration during the design phase of a business impact analysis (BIA)?

Options:

A.  

Selecting quality metrics to monitor business performance

B.  

Estimating the likelihood that end-to-end processes will be disrupted

C.  

Obtaining reserve funding to prepare for possible business failures

D.  

Identifying critical functions for business operations

Discussion 0
Question # 62

How would the information security program BEST support the adoption of emerging technologies?

Options:

A.  

Conducting a control assessment

B.  

Developing an emerging technology roadmap

C.  

Providing effective risk governance

D.  

Developing an acceptable use policy

Discussion 0
Question # 63

Which of the following BEST determines an information asset's classification?

Options:

A.  

Value of the information asset in the marketplace

B.  

Criticality to a business process

C.  

Risk assessment from the data owner

D.  

Cost of producing the information asset

Discussion 0
Question # 64

An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?

Options:

A.  

Instruct IT to deploy controls based on urgent business needs.

B.  

Present a business case for additional controls to senior management.

C.  

Solicit bids for compensating control products.

D.  

Recommend a different application.

Discussion 0
Question # 65

Which of the following is the BEST approach for addressing noncompliance with security standards?

Options:

A.  

Develop new security standards.

B.  

Maintain a security exceptions process.

C.  

Discontinue affected activities until security requirements can be met.

D.  

Apply additional logging and monitoring to affected assets.

Discussion 0
Question # 66

Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?

Options:

A.  

Establish an information security steering committee.

B.  

Employ a process-based approach for information asset classification.

C.  

Utilize an industry-recognized risk management framework.

D.  

Provide security awareness training to board executives.

Discussion 0
Question # 67

Which of the following events is MOST likely to require an organization to revisit its information security framework?

Options:

A.  

New services offered by IT

B.  

Changes to the risk landscape

C.  

A recent cybersecurity attack

D.  

A new technology implemented

Discussion 0
Question # 68

Which of the following is a PRIMARY benefit of managed security solutions?

Options:

A.  

Wider range of capabilities

B.  

Easier implementation across an organization

C.  

Greater ability to focus on core business operations

D.  

Lower cost of operations

Discussion 0
Question # 69

When establishing an information security governance framework, it is MOST important for an information security manager to understand:

Options:

A.  

information security best practices.

B.  

risk management techniques.

C.  

the threat environment.

D.  

the corporate culture.

Discussion 0
Question # 70

When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:

Options:

A.  

consider the organizations business strategy.

B.  

consider the strategic objectives of the program.

C.  

leverage industry benchmarks.

D.  

identify the program's risk and compensating controls.

Discussion 0
Question # 71

Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?

Options:

A.  

It transfers the risk associated with recovery to a third party.

B.  

It lowers the annual cost to the business.

C.  

It eliminates the need to maintain offsite facilities.

D.  

It eliminates the need for the business to perform testing.

Discussion 0
Question # 72

An incident response team has established that an application has been breached. Which of the following should be done NEXT?

Options:

A.  

Maintain the affected systems in a forensically acceptable state

B.  

Conduct a risk assessment on the affected application

C.  

Inform senior management of the breach.

D.  

Isolate the impacted systems from the rest of the network

Discussion 0
Question # 73

The PRIMARY goal of the eradication phase in an incident response process is to:

Options:

A.  

maintain a strict chain of custody.

B.  

provide effective triage and containment of the incident.

C.  

remove the threat and restore affected systems

D.  

obtain forensic evidence from the affected system.

Discussion 0
Question # 74

Which of the following BEST demonstrates the added value of an information security program?

Options:

A.  

Security baselines

B.  

A gap analysis

C.  

A SWOT analysis

D.  

A balanced scorecard

Discussion 0
Question # 75

Which of the following BEST enables an information security manager to demonstrate the effectiveness of the information security and risk program to senior management?

Options:

A.  

Updated risk assessments

B.  

Counts of information security incidents

C.  

Audit reports

D.  

Monthly metrics

Discussion 0
Question # 76

During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:

Options:

A.  

baseline security controls.

B.  

benchmarking security metrics.

C.  

security objectives.

D.  

cost-benefit analyses.

Discussion 0
Question # 77

Who is accountable for approving an information security governance framework?

Options:

A.  

The board of directors

B.  

The chief information security officer (ClSO)

C.  

The enterprise risk committee

D.  

The chief information officer (CIO)

Discussion 0
Question # 78

An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:

Options:

A.  

the chief risk officer (CRO).

B.  

business senior management.

C.  

the information security manager.

D.  

the compliance officer.

Discussion 0
Question # 79

Which of the following activities MUST be performed by an information security manager for change requests?

Options:

A.  

Perform penetration testing on affected systems.

B.  

Scan IT systems for operating system vulnerabilities.

C.  

Review change in business requirements for information security.

D.  

Assess impact on information security risk.

Discussion 0
Question # 80

An information security team has confirmed that threat actors are taking advantage of a newly announced critical vulnerability within an application. Which of the following should be done

FIRST?

Options:

A.  

Install additional application controls.

B.  

Notify senior management.

C.  

Invoke the incident response plan.

D.  

Prevent access to the application.

Discussion 0
Get CISM dumps and pass your exam in 24 hours!

Free Exams Sample Questions