Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISM Exam Dumps - Isaca Certification Questions and Answers

Question # 204

Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?

Options:

A.

To prioritize security initiatives

B.

To avoid redundant controls

C.

To align with emerging risk

D.

To address end-user control complaints

Buy Now
Question # 205

An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?

Options:

A.

Guidelines

B.

Policies

C.

Procedures

D.

Standards

Buy Now
Question # 206

Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?

Options:

A.

Revisit the business objective.

B.

Escalate to senior management.

C.

Perform a cost-benefit analysis.

D.

Recommend risk acceptance.

Buy Now
Question # 207

The executive management of a domestic organization has announced plans to expand operations to multiple international locations. Which of the following should be the information security manager's FIRST step upon learning of these plans?

Options:

A.

Perform a gap analysis against international information security standards

B.

Update security training and awareness resources accordingly

C.

Research legal and regulatory requirements impacting the new locations

D.

Prepare localized information security policies for each new location

Buy Now
Question # 208

Which of the following is MOST important to the effectiveness of an information security steering committee?

Options:

A.

The committee has strong regulatory knowledge.

B.

The committee is comprised of representatives from senior management.

C.

The committee has cross-organizational representation.

D.

The committee uses a risk management framework.

Buy Now
Question # 209

Which of the following should be the MOST important consideration when establishing information security policies for an organization?

Options:

A.

Job descriptions include requirements to read security policies.

B.

The policies are updated annually.

C.

Senior management supports the policies.

D.

The policies are aligned to industry best practices.

Buy Now
Question # 210

Which of the following should be done FIRST when establishing an information security governance framework?

Options:

A.

Evaluate information security tools and skills relevant for the environment.

B.

Gain an understanding of the business and cultural attributes.

C.

Contract a third party to conduct an independent review of the program.

D.

Conduct a cost-benefit analysis of the framework.

Buy Now
Question # 211

What is the PRIMARY objective of performing a vulnerability assessment following a business system update?

Options:

A.

Determine operational losses.

B.

Improve the change control process.

C.

Update the threat landscape.

D.

Review the effectiveness of controls

Buy Now
Question # 212

When assigning a risk owner, the MOST important consideration is to ensure the owner has:

Options:

A.

adequate knowledge of risk treatment and related control activities.

B.

decision-making authority and the ability to allocate resources for risk.

C.

sufficient time for monitoring and managing the risk effectively.

D.

risk communication and reporting skills to enable decision-making.

Buy Now
Question # 213

What should an information security manager verify FIRST when reviewing an information asset management program?

Options:

A.

System owners have been identified.

B.

Key applications have been secured.

C.

Information assets have been classified.

D.

Information assets have been inventoried.

Buy Now
Question # 214

An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?

Options:

A.

Implement multi-factor authentication.

B.

Increase the frequency of log monitoring and analysis.

C.

Implement a security information and event management system (SIEM),

D.

Increase the sensitivity of intrusion detection systems (IDSs).

Buy Now
Question # 215

Which of the following business units should own the data that populates an identity management system?

Options:

A.

Human resources (HR)

B.

Legal

C.

Information technology

D.

Information security

Buy Now
Question # 216

Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?

Options:

A.

Alive demonstration of the third-party supplier's security capabilities

B.

The ability to i third-party supplier's IT systems and processes

C.

Third-party security control self-assessment (CSA) results

D.

An independent review report indicating compliance with industry standards

Buy Now
Question # 217

Which of the following would be MOST useful to help senior management understand the status of information security compliance?

Options:

A.

Industry benchmarks

B.

Key performance indicators (KPIs)

C.

Business impact analysis (BIA) results

D.

Risk assessment results

Buy Now
Question # 218

Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?

Options:

A.

Enterprise risk committee

B.

Information security steering committee

C.

Data privacy officer (DPO)

D.

Chief information security officer (CISO)

Buy Now
Question # 219

An organization is planning to engage a third-party service provider to develop custom software. Which of the following would help to provide the GREATEST assurance of software security?

Options:

A.

Security training for the service provider’s software development staff

B.

Independent assessment against a relevant standard

C.

Verification of certifications held by the individual developers

D.

Review of the service provider’s software development policies

Buy Now
Question # 220

A Seat a-hosting organization's data center houses servers, appli

BEST approach for developing a physical access control policy for the organization?

Options:

A.

Review customers’ security policies.

B.

Conduct a risk assessment to determine security risks and mitigating controls.

C.

Develop access control requirements for each system and application.

D.

Design single sign-on (SSO) or federated access.

Buy Now
Question # 221

Which of the following BEST informs the design of an information security framework?

Options:

A.

Recent audit findings

B.

Implementation cost

C.

Risk appetite

D.

Available skills

Buy Now
Question # 222

Which of the following should be the PRIMARY objective for creating a culture of security within an organization?

Options:

A.

To obtain resources for information security initiatives

B.

To prioritize security within the organization

C.

To reduce risk to acceptable levels

D.

To demonstrate control effectiveness to senior management

Buy Now
Question # 223

In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:

Options:

A.

evaluate results of the most recent incident response test.

B.

review the number of reported security incidents.

C.

ensure established security metrics are reported.

D.

assess progress of risk mitigation efforts.

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Feb 20, 2026
Questions: 1044
CISM pdf

CISM PDF

$59.7  $199
CISM Engine

CISM Testing Engine

$67.5  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$74.7  $249