Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISM Certified Information Security Manager is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISM Practice Questions

Certified Information Security Manager

Last Update 3 days ago
Total Questions : 1044

Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.

CISM PDF

CISM PDF (Printable)
$69.65
$199

CISM Testing Engine

CISM PDF (Printable)
$78.75
$225

CISM PDF + Testing Engine

CISM PDF (Printable)
$87.15
$249
Question # 141

Which of the following analyses will BEST identify the external influences to an organization's information security?

Options:

A.  

Business impact analysis (BIA)

B.  

Gap analysis

C.  

Threat analysis

D.  

Vulnerability analysis

Discussion 0
Question # 142

While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?

Options:

A.  

Assign responsibility to the database administrator (DBA).

B.  

Review the databases for sensitive content.

C.  

Prepare a report of the databases for senior management.

D.  

Assign the highest classification level to those databases.

Discussion 0
Question # 143

Which of the following backup methods requires the MOST time to restore data for an application?

Options:

A.  

Full backup

B.  

Incremental

C.  

Differential

D.  

Disk mirroring

Discussion 0
Question # 144

An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:

Options:

A.  

a directory of approved local media contacts

B.  

pre-prepared media statements

C.  

procedures to contact law enforcement

D.  

a single point of contact within the organization

Discussion 0
Question # 145

Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?

Options:

A.  

To facilitate a qualitative risk assessment following the BIA

B.  

To increase awareness of information security among key stakeholders

C.  

To ensure the stakeholders providing input own the related risk

D.  

To obtain input from as many relevant stakeholders as possible

Discussion 0
Question # 146

Which of the following should be done FIRST when a SIEM flags a potential event?

Options:

A.  

Validate the event is not a false positive.

B.  

Initiate the incident response plan.

C.  

Escalate the event to the business owner.

D.  

Implement compensating controls.

Discussion 0
Question # 147

The PRIMARY advantage of involving end users in continuity planning is that they:

Options:

A.  

have a better understanding of specific business needs.

B.  

are more objective than information security management.

C.  

can see the overall impact to the business.

D.  

can balance the technical and business risks.

Discussion 0
Question # 148

Which of the following is MOST important to the successful implementation of an information security program?

Options:

A.  

Adequate security resources are allocated to the program.

B.  

Key performance indicators (KPIs) are defined.

C.  

A balanced scorecard is approved by the steering committee.

D.  

The program is developed using global security standards.

Discussion 0
Question # 149

An organization has determined that fixing a security vulnerability in a critical application is too costly to be feasible, but the impact is material to the business. Which of the following is the MOST appropriate risk treatment?

Options:

A.  

Purchase cybersecurity insurance.

B.  

Accept the risk associated with continued use of the application.

C.  

Implement compensating controls for the application.

D.  

Discontinue using the application.

Discussion 0
Question # 150

Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?

Options:

A.  

Review compliance requirements.

B.  

Communicate the exposure.

C.  

Declare an incident.

D.  

Change the encryption keys.

Discussion 0
Question # 151

Which of the following is the MOST important reason to document information security incidents that are reported across the organization?

Options:

A.  

Evaluate the security posture of the organization.

B.  

Identify unmitigated risk.

C.  

Prevent incident recurrence.

D.  

Support business investments in security.

Discussion 0
Question # 152

Which of the following defines the triggers within a business continuity plan (BCP)? @

Options:

A.  

Needs of the organization

B.  

Disaster recovery plan (DRP)

C.  

Information security policy

D.  

Gap analysis

Discussion 0
Question # 153

Which of the following is the BEST indicator of an emerging incident?

Options:

A.  

A weakness identified within an organization's information systems

B.  

Customer complaints about lack of website availability

C.  

A recent security incident at an industry competitor

D.  

Attempted patching of systems resulting in errors

Discussion 0
Question # 154

Which of the following is MOST important for the successful implementation of an incident response plan?

Options:

A.  

Ensuring response staff are appropriately trained

B.  

Developing metrics for incident response reporting

C.  

Establishing an escalation process for the help desk

D.  

Developing a RACI chart of response staff functions

Discussion 0
Question # 155

Which of the following would BEST ensure that security is integrated during application development?

Options:

A.  

Employing global security standards during development processes

B.  

Providing training on secure development practices to programmers

C.  

Performing application security testing during acceptance testing

D.  

Introducing security requirements during the initiation phase

Discussion 0
Question # 156

Which of the following would BEST help to ensure appropriate security controls are built into software?

Options:

A.  

Integrating security throughout the development process

B.  

Performing security testing prior to deployment

C.  

Providing standards for implementation during development activities

D.  

Providing security training to the software development team

Discussion 0
Question # 157

Which of the following has the GREATEST influence on an organization's information security strategy?

Options:

A.  

The organization's risk tolerance

B.  

The organizational structure

C.  

Industry security standards

D.  

Information security awareness

Discussion 0
Question # 158

What is the PRIMARY benefit to an organization when information security program requirements are aligned with employment and staffing processes?

Options:

A.  

Security incident reporting procedures are followed.

B.  

Security staff turnover is reduced.

C.  

Information assets are classified appropriately.

D.  

Access is granted based on task requirements.

Discussion 0
Question # 159

Which of the following is MOST important when defining how an information security budget should be allocated?

Options:

A.  

Regulatory compliance standards

B.  

Information security strategy

C.  

Information security policy

D.  

Business impact assessment

Discussion 0
Question # 160

Which of the following is CRITICAL to ensure the appropriate stakeholder makes decisions during a cybersecurity incident?

Options:

A.  

Stakeholder plan

B.  

Escalation plan

C.  

Up-to-date risk register

D.  

Asset classification

Discussion 0
Get CISM dumps and pass your exam in 24 hours!

Free Exams Sample Questions