CISM Practice Questions
Certified Information Security Manager
Last Update 3 days ago
Total Questions : 1044
Dive into our fully updated and stable CISM practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.
Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISM. Use this test to pinpoint which areas you need to focus your study on.
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:
Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?
Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P
Which of the following is MOST important for an information security manager to consider when determining whether data should be stored?
An information security manager wants to upgrade an organization’s workstations to a new operating system version. Which of the following would be MOST helpful to gain senior management support for the upgrade?
An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
What type of control is being implemented when a security information and event management (SIEM) system is installed?
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
Which of the following is BEST used to determine the maturity of an information security program?
Which of the following is a PRIMARY function of an incident response team?
Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?
Which of the following BEST enables an organization to maintain legally admissible evidence7
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:
Threat and vulnerability assessments are important PRIMARILY because they are:
Which of the following is the MOST appropriate metric to demonstrate the effectiveness of information security controls to senior management?
Which of the following is MOST important to include in monthly information security reports to the board?
Which of the following BEST enables an organization to effectively manage emerging cyber risk?
