Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISM Certified Information Security Manager is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISM Practice Questions

Certified Information Security Manager

Last Update 3 days ago
Total Questions : 1044

Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.

CISM PDF

CISM PDF (Printable)
$69.65
$199

CISM Testing Engine

CISM PDF (Printable)
$78.75
$225

CISM PDF + Testing Engine

CISM PDF (Printable)
$87.15
$249
Question # 161

An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:

Options:

A.  

service level agreements (SLAs)

B.  

security requirements for the process being outsourced.

C.  

risk-reporting methodologies.

D.  

security metrics

Discussion 0
Question # 162

Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?

Options:

A.  

Information security manager

B.  

Information security steering committee

C.  

Information owner

D.  

Senior management

Discussion 0
Question # 163

Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P

Options:

A.  

Report the decision to the compliance officer

B.  

Update details within the risk register.

C.  

Reassess the organization's risk tolerance.

D.  

Assess the impact of the regulation.

Discussion 0
Question # 164

Which of the following is MOST important for an information security manager to consider when determining whether data should be stored?

Options:

A.  

Data protection regulations

B.  

Data storage limitations

C.  

Business requirements

D.  

Type and nature of data

Discussion 0
Question # 165

An information security manager wants to upgrade an organization’s workstations to a new operating system version. Which of the following would be MOST helpful to gain senior management support for the upgrade?

Options:

A.  

An assessment of the current operating system based on risk

B.  

A summary of performance improvements in the new operating system

C.  

The results of user surveys indicating issues with the current operating system

D.  

A list of the latest security features in the new operating system

Discussion 0
Question # 166

An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?

Options:

A.  

Implementing separation of duties between systems and data

B.  

Including penalty clauses for noncompliance in the vendor contract

C.  

Disabling vendor access and only re-enabling when access is needed

D.  

Monitoring key risk indicators (KRIs)

Discussion 0
Question # 167

Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?

Options:

A.  

Host patching

B.  

Penetration testing

C.  

Infrastructure hardening

D.  

Data classification

Discussion 0
Question # 168

What type of control is being implemented when a security information and event management (SIEM) system is installed?

Options:

A.  

Preventive

B.  

Deterrent

C.  

Detective

D.  

Corrective

Discussion 0
Question # 169

Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?

Options:

A.  

Threat analytics software

B.  

Host intrusion detection system

C.  

SIEM

D.  

Network intrusion detection system

Discussion 0
Question # 170

Which of the following is BEST used to determine the maturity of an information security program?

Options:

A.  

Security budget allocation

B.  

Organizational risk appetite

C.  

Risk assessment results

D.  

Security metrics

Discussion 0
Question # 171

Which of the following is a PRIMARY function of an incident response team?

Options:

A.  

To provide effective incident mitigation

B.  

To provide a risk assessment for zero-day vulnerabilities

C.  

To provide a single point of contact for critical incidents

D.  

To provide a business impact analysis (BIA)

Discussion 0
Question # 172

Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?

Options:

A.  

Computer forensics

B.  

Continuous log monitoring

C.  

Root cause analysis

D.  

Penetration testing

Discussion 0
Question # 173

Which of the following BEST enables an organization to maintain legally admissible evidence7

Options:

A.  

Documented processes around forensic records retention

B.  

Robust legal framework with notes of legal actions

C.  

Chain of custody forms with points of contact

D.  

Forensic personnel training that includes technical actions

Discussion 0
Question # 174

Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?

Options:

A.  

Disaster recovery plan (DRP)

B.  

Incident response plan

C.  

Business continuity plan (BCP)

D.  

Business contingency plan

Discussion 0
Question # 175

When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:

Options:

A.  

the integrity of evidence is preserved.

B.  

forensic investigation software is loaded on the server.

C.  

the incident is reported to senior management.

D.  

the server is unplugged from power.

Discussion 0
Question # 176

Threat and vulnerability assessments are important PRIMARILY because they are:

Options:

A.  

used to establish security investments

B.  

the basis for setting control objectives.

C.  

elements of the organization's security posture.

D.  

needed to estimate risk.

Discussion 0
Question # 177

Which of the following is the MOST appropriate metric to demonstrate the effectiveness of information security controls to senior management?

Options:

A.  

Downtime due to malware infections

B.  

Number of security vulnerabilities uncovered with network scans

C.  

Percentage of servers patched

D.  

Annualized loss resulting from security incidents

Discussion 0
Question # 178

Penetration testing is MOST appropriate when a:

Options:

A.  

new system is about to go live.

B.  

new system is being designed.

C.  

security policy is being developed.

D.  

security incident has occurred,

Discussion 0
Question # 179

Which of the following is MOST important to include in monthly information security reports to the board?

Options:

A.  

Trend analysis of security metrics

B.  

Risk assessment results

C.  

Root cause analysis of security incidents

D.  

Threat intelligence

Discussion 0
Question # 180

Which of the following BEST enables an organization to effectively manage emerging cyber risk?

Options:

A.  

Periodic internal and external audits

B.  

Clear lines of responsibility

C.  

Sufficient cyber budget allocation

D.  

Cybersecurity policies

Discussion 0
Get CISM dumps and pass your exam in 24 hours!

Free Exams Sample Questions