CISM Practice Questions
Certified Information Security Manager
Last Update 3 days ago
Total Questions : 1044
Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.
Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.
Which of the following is the MOST important consideration during the design phase of a business impact analysis (BIA)?
How would the information security program BEST support the adoption of emerging technologies?
Which of the following BEST determines an information asset's classification?
An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?
Which of the following is the BEST approach for addressing noncompliance with security standards?
Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?
Which of the following events is MOST likely to require an organization to revisit its information security framework?
Which of the following is a PRIMARY benefit of managed security solutions?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:
Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?
An incident response team has established that an application has been breached. Which of the following should be done NEXT?
The PRIMARY goal of the eradication phase in an incident response process is to:
Which of the following BEST demonstrates the added value of an information security program?
Which of the following BEST enables an information security manager to demonstrate the effectiveness of the information security and risk program to senior management?
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
Who is accountable for approving an information security governance framework?
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
Which of the following activities MUST be performed by an information security manager for change requests?
An information security team has confirmed that threat actors are taking advantage of a newly announced critical vulnerability within an application. Which of the following should be done
FIRST?
