Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISM Certified Information Security Manager is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISM Practice Questions

Certified Information Security Manager

Last Update 3 days ago
Total Questions : 1044

Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.

CISM PDF

CISM PDF (Printable)
$69.65
$199

CISM Testing Engine

CISM PDF (Printable)
$78.75
$225

CISM PDF + Testing Engine

CISM PDF (Printable)
$87.15
$249
Question # 81

Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?

Options:

A.  

Backups are maintained offline and regularly tested.

B.  

Impacted networks can be detached at the network switch level.

C.  

Production data is continuously replicated between primary and secondary sites.

D.  

Backups are maintained on multiple sites and regularly reviewed.

Discussion 0
Question # 82

Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?

Options:

A.  

Perform a vulnerability assessment

B.  

Perform a gap analysis to determine needed resources

C.  

Create a security exception

D.  

Assess the risk to business operations

Discussion 0
Question # 83

Relationships between critical systems are BEST understood by

Options:

A.  

evaluating key performance indicators (KPIs)

B.  

performing a business impact analysis (BIA)

C.  

developing a system classification scheme

D.  

evaluating the recovery time objectives (RTOs)

Discussion 0
Question # 84

An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?

Options:

A.  

Business impact analysis (BIA)

B.  

Business continuity plan (BCP)

C.  

Incident response plan

D.  

Disaster recovery plan (DRP)

Discussion 0
Question # 85

Which of the following risks is an example of risk transfer?

Options:

A.  

Utilizing third-party applications

B.  

Moving risk ownership to another department

C.  

Conducting off-site backups

D.  

Purchasing cybersecurity insurance

Discussion 0
Question # 86

An information security manager has become aware that system administrators are not changing server administrator accounts from the default usernames. A policy has been created and approved by business managers to require these changes. Which of the following should be the information security manager’s FIRST course of action?

Options:

A.  

Include the requirement in information security awareness materials

B.  

Perform a policy compliance assessment

C.  

Ensure the policy has been communicated to the system administrators

Discussion 0
Question # 87

After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?

Options:

A.  

Calculating cost of the incident

B.  

Conducting a postmortem assessment

C.  

Performing an impact analysis

D.  

Preserving the evidence

Discussion 0
Question # 88

Which of the following is an example of risk mitigation?

Options:

A.  

Purchasing insurance

B.  

Discontinuing the activity associated with the risk

C.  

Improving security controls

D.  

Performing a cost-benefit analysis

Discussion 0
Question # 89

When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?

Options:

A.  

Data is encrypted in transit and at rest at the vendor site.

B.  

Data is subject to regular access log review.

C.  

The vendor must be able to amend data.

D.  

The vendor must agree to the organization's information security policy,

Discussion 0
Question # 90

Which of the following is the PRIMARY benefit of implementing an information security governance framework?

Options:

A.  

The framework defines managerial responsibilities for risk impacts to business goals.

B.  

The framework provides direction to meet business goals while balancing risks and controls.

C.  

The framework provides a roadmap to maximize revenue through the secure use of technology.

D.  

The framework is able to confirm the validity of business goals and strategies.

Discussion 0
Question # 91

A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?

Options:

A.  

Employee training on ransomware

B.  

A properly tested offline backup system

C.  

A continual server replication process

D.  

A properly configured firewall

Discussion 0
Question # 92

Which of the following would BEST enable the help desk to recognize an information security incident?

Options:

A.  

Train the help desk to review the call logs.

B.  

Require the help desk to participate in post-incident reviews.

C.  

Provide the help desk with criteria for security incidents.

D.  

Include members of the help desk on the security incident response team.

Discussion 0
Question # 93

Which of the following should be the NEXT step after a security incident has been reported?

Options:

A.  

Recovery

B.  

Investigation

C.  

Escalation

D.  

Containment

Discussion 0
Question # 94

Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?

Options:

A.  

To identify the organization's risk tolerance

B.  

To improve security processes

C.  

To align security roles and responsibilities

D.  

To optimize security risk management

Discussion 0
Question # 95

What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?

Options:

A.  

Developing a dashboard for communicating the metrics

B.  

Agreeing on baseline values for the metrics

C.  

Benchmarking the expected value of the metrics against industry standards

D.  

Aligning the metrics with the organizational culture

Discussion 0
Question # 96

Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?

Options:

A.  

Walk-through of the incident response plan

B.  

Black box penetration test

C.  

Simulated phishing exercise

D.  

Red team exercise

Discussion 0
Question # 97

A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:

Options:

A.  

incident has been confirmed.

B.  

incident has been contained.

C.  

potential incident has been logged.

D.  

incident has been mitigated.

Discussion 0
Question # 98

When evaluating cloud storage solutions, the FIRST consideration should be:

Options:

A.  

The service level agreement (SLA) for encryption keys

B.  

Alignment with the organization’s data classification policy

C.  

How the organization’s sensitive data will be transferred

D.  

The volume of data to be stored in the cloud

Discussion 0
Question # 99

An information security manager is concerned with continued security policy violations in a particular business unit despite recent efforts to rectify the situation. What is the BEST course of action?

Options:

A.  

Revise the policy to accommodate the business unit.

B.  

Report the business unit for policy noncompliance.

C.  

Review the business unit’s function against the policy.

D.  

Enforce sanctions on the business unit.

Discussion 0
Question # 100

A financial institution is planning to develop a new mobile application. Which of the following is the BEST time to begin assessments of the application's security compliance?

Options:

A.  

During user acceptance testing (UAT)

B.  

During the design phase

C.  

During static code analysis

D.  

During regulatory review

Discussion 0
Get CISM dumps and pass your exam in 24 hours!

Free Exams Sample Questions