Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISM Certified Information Security Manager is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISM Practice Questions

Certified Information Security Manager

Last Update 3 days ago
Total Questions : 1044

Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.

CISM PDF

CISM PDF (Printable)
$69.65
$199

CISM Testing Engine

CISM PDF (Printable)
$78.75
$225

CISM PDF + Testing Engine

CISM PDF (Printable)
$87.15
$249
Question # 101

A security incident has been reported within an organization When should an information security manager contact the information owner?

Options:

A.  

After the incident has been mitigated

B.  

After the incident has been confirmed.

C.  

After the potential incident has been togged

D.  

After the incident has been contained

Discussion 0
Question # 102

A newly appointed information security manager of a retailer with multiple stores discovers an HVAC (heating, ventilation, and air conditioning) vendor has remote access to the stores to enable real-time monitoring and equipment diagnostics. Which of the following should be the information security manager's FIRST course of action?

Options:

A.  

Conduct a penetration test of the vendor.

B.  

Review the vendor's technical security controls

C.  

Review the vendor contract

D.  

Disconnect the real-time access

Discussion 0
Question # 103

Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?

Options:

A.  

IT strategy

B.  

Recovery strategy

C.  

Risk mitigation strategy

D.  

Security strategy

Discussion 0
Question # 104

The PRIMARY goal when conducting post-incident reviews is to identify:

Options:

A.  

Additional cybersecurity budget needs

B.  

Weaknesses in incident response plans

C.  

Information to be shared with senior management

D.  

Individuals that need additional training

Discussion 0
Question # 105

Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?

Options:

A.  

Providing training from third-party forensics firms

B.  

Obtaining industry certifications for the response team

C.  

Conducting tabletop exercises appropriate for the organization

D.  

Documenting multiple scenarios for the organization and response steps

Discussion 0
Question # 106

An organization is performing due diligence when selecting a third party. Which of the following is MOST helpful to reduce the risk of unauthorized sharing of information during this process?

Options:

A.  

Using secure communication channels

B.  

Establishing mutual non-disclosure agreements (NDAs)

C.  

Requiring third-party privacy policies

D.  

Obtaining industry references

Discussion 0
Question # 107

Recovery time objectives (RTOs) are BEST determined by:

Options:

A.  

business managers

B.  

business continuity officers

C.  

executive management

D.  

database administrators (DBAs).

Discussion 0
Question # 108

Which of the following is the BEST reason to implement an information security architecture?

Options:

A.  

Assess the cost-effectiveness of the integration.

B.  

Fast-track the deployment of information security components.

C.  

Serve as a post-deployment information security road map.

D.  

Facilitate consistent implementation of security requirements.

Discussion 0
Question # 109

Which of the following is the BEST way to determine the effectiveness of an incident response plan?

Options:

A.  

Reviewing previous audit reports

B.  

Conducting a tabletop exercise

C.  

Benchmarking the plan against best practices

D.  

Performing a penetration test

Discussion 0
Question # 110

Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?

Options:

A.  

Security policy

B.  

Risk management framework

C.  

Risk appetite

D.  

Security standards

Discussion 0
Question # 111

Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?

Options:

A.  

Focus on addressing conflicts between security and performance.

B.  

Collaborate with business and IT functions in determining controls.

C.  

Include information security requirements in the change control process.

D.  

Obtain assistance from IT to implement automated security cantrals.

Discussion 0
Question # 112

A backdoor has been identified that enabled a cyberattack on an organization’s systems. Integrating which of the following into the software development life cycle would BEST enable the organization to mitigate similar attacks in the future?

Options:

A.  

Enhanced user acceptance testing (UAT)

B.  

Separation of duties

C.  

Customized developer training

D.  

Vulnerability testing

Discussion 0
Question # 113

Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?

Options:

A.  

Clearer segregation of duties

B.  

Increased user productivity

C.  

Increased accountability

D.  

Fewer security incidents

Discussion 0
Question # 114

Which of the following is MOST important to ensuring that incident management plans are executed effectively?

Options:

A.  

Management support and approval has been obtained.

B.  

The incident response team has the appropriate training.

C.  

An incident response maturity assessment has been conducted.

D.  

A reputable managed security services provider has been engaged.

Discussion 0
Question # 115

Which of the following is the BEST course of action when an information security manager identifies that systems are vulnerable to emerging threats?

Options:

A.  

Frequently update systems and monitor the threat landscape.

B.  

Monitor the network containing the affected systems for malicious traffic.

C.  

Increase awareness of the threats among employees who work with the systems.

D.  

Notify senior management and key stakeholders of the threats.

Discussion 0
Question # 116

An information security team has started work to mitigate findings from a recent penetration test. Which of the following presents the GREATEST risk to the organization?

Options:

A.  

Some findings were reclassified to low risk after evaluation

B.  

Not all findings from the penetration test report were fixed

C.  

The penetration testing report did not contain any high-risk findings

D.  

Risk classification of penetration test findings was not performed

Discussion 0
Question # 117

Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?

Options:

A.  

Presenting evidence of inherent risk

B.  

Reporting the security maturity level

C.  

Presenting compliance requirements

D.  

Communicating the residual risk

Discussion 0
Question # 118

An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?

Options:

A.  

Determine which country's information security regulations will be used.

B.  

Merge the two existing information security programs.

C.  

Apply the existing information security program to the acquired company.

D.  

Evaluate the information security laws that apply to the acquired company.

Discussion 0
Question # 119

Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?

Options:

A.  

Impact on information security program

B.  

Cost of controls

C.  

Impact to business function

D.  

Cost to replace

Discussion 0
Question # 120

Which of the following is the MOST effective way to increase security awareness in an organization?

Options:

A.  

Implement regularly scheduled information security audits.

B.  

Require signed acknowledgment of information security policies.

C.  

Conduct periodic simulated phishing exercises.

D.  

Include information security requirements in job descriptions.

Discussion 0
Get CISM dumps and pass your exam in 24 hours!

Free Exams Sample Questions