CISM Practice Questions
Certified Information Security Manager
Last Update 3 days ago
Total Questions : 1044
Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.
Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.
Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?
An information security manager has become aware that system administrators are not changing server administrator accounts from the default usernames. A policy has been created and approved by business managers to require these changes. Which of the following should be the information security manager’s FIRST course of action?
After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?
Which of the following is the PRIMARY benefit of implementing an information security governance framework?
A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
Which of the following would BEST enable the help desk to recognize an information security incident?
Which of the following should be the NEXT step after a security incident has been reported?
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?
Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?
A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
When evaluating cloud storage solutions, the FIRST consideration should be:
An information security manager is concerned with continued security policy violations in a particular business unit despite recent efforts to rectify the situation. What is the BEST course of action?
A financial institution is planning to develop a new mobile application. Which of the following is the BEST time to begin assessments of the application's security compliance?
