CISM Practice Questions
Certified Information Security Manager
Last Update 3 days ago
Total Questions : 1044
Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.
Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.
Which of the following BEST enables the integration of information security governance into corporate governance?
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?
To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:
A security incident has been reported within an organization. When should an information security manager contact the information owner?
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
Which of the following is the BEST course of action when an online company discovers a network attack in progress?
When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?
Which of the following is the MOST likely reason for a vulnerability scanner to return incomplete results?
An organization is considering the feasibility of implementing a big data solution to analyze customer data. In order to support this initiative, the information security manager should FIRST:
Which type of policy BEST helps to ensure that all employees, contractors, and third-party users receive formal communication regarding an organization’s security program?
Which of the following is the MOST effective way to protect the authenticity of data in transit?
Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
A business impact analysis (BIA) BEST enables an organization to establish:
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
