Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CISM Exam Dumps - Isaca Certification Questions and Answers

Question # 224

Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?

Options:

A.

Assess changes in the risk profile.

B.

Activate the disaster recovery plan (DRP).

C.

Invoke the incident response plan.

D.

Conduct security awareness training.

Buy Now
Question # 225

An organization has remediated a security flaw in a system. Which of the following should be done NEXT?

Options:

A.

Assess the residual risk.

B.

Share lessons learned with the organization.

C.

Update the system's documentation.

D.

Allocate budget for penetration testing.

Buy Now
Question # 226

The PRIMARY purpose of vulnerability identification is to:

Options:

A.

Remediate vulnerabilities before they are exploited

B.

Discover control deficiencies

C.

Provide vulnerability identifiers for risk reporting

D.

Prioritize vulnerability remediation

Buy Now
Question # 227

Which of the following is the BEST indication of an effective disaster recovery planning process?

Options:

A.

Hot sites are required for any declared disaster.

B.

Chain of custody is maintained throughout the disaster recovery process.

C.

Post-incident reviews are conducted after each event.

D.

Recovery time objectives (RTOs) are shorter than recovery point objectives (RPOs).

Buy Now
Question # 228

Which of the following would provide the BEST evidence to senior management that security control performance has improved?

Options:

A.

Demonstrated return on security investment

B.

Reduction in inherent risk

C.

Results of an emerging threat analysis

D.

Review of security metrics trends

Buy Now
Question # 229

Which of the following BEST enables an organization to effectively manage emerging cyber risk?

Options:

A.

Periodic internal and external audits

B.

Clear lines of responsibility

C.

Sufficient cyber budget allocation

D.

Cybersecurity policies

Buy Now
Question # 230

Which of the following should be the FIRST consideration when developing a strategy for protecting an organization's data?

Options:

A.

Classification

B.

Encryption

C.

Access monitoring

D.

Access rights

Buy Now
Question # 231

Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?

Options:

A.

Obtain consensus on the strategy from the executive board.

B.

Review alignment with business goals.

C.

Define organizational risk tolerance.

D.

Develop a project plan to implement the strategy.

Buy Now
Question # 232

Which of the following is the BEST way to obtain support for a new organization-wide information security program?

Options:

A.

Benchmark against similar industry organizations

B.

Deliver an information security awareness campaign.

C.

Publish an information security RACI chart.

D.

Establish an information security strategy committee.

Buy Now
Question # 233

Which of the following is the BEST indication of a mature information security program?

Options:

A.

Security incidents are managed properly.

B.

Security spending is below budget.

C.

Security resources are optimized.

D.

Security audit findings are reduced.

Buy Now
Question # 234

Which of the following metrics would provide an accurate measure of an information security program's performance?

Options:

A.

A collection of qualitative indicators that accurately measure security exceptions

B.

A combination of qualitative and quantitative trends that enable decision making

C.

A collection of quantitative indicators that are compared against industry benchmarks

D.

A single numeric score derived from various measures assigned to the security program

Buy Now
Question # 235

The fundamental purpose of establishing security metrics is to:

Options:

A.

increase return on investment (ROI)

B.

provide feedback on control effectiveness

C.

adopt security best practices

D.

establish security benchmarks

Buy Now
Question # 236

Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?

Options:

A.

Review the key performance indicator (KPI) dashboard

B.

Review security-related key risk indicators (KRIs)

C.

Review control self-assessment (CSA) results

D.

Review periodic security audits

Buy Now
Question # 237

Which of the following is the BEST course of action after management has reviewed an identified risk and determines the risk is below the defined risk appetite?

Options:

A.

Accept

B.

Avoid

C.

Transfer

D.

Mitigate

Buy Now
Question # 238

Information security policies should PRIMARILY reflect alignment with:

Options:

A.

an information security framework.

B.

industry best practices.

C.

data security standards.

D.

senior management intent.

Buy Now
Question # 239

An information security manager determines there are a significant number of exceptions to a newly released industry-required security standard. Which of the following should be done NEXT?

Options:

A.

Document risk acceptances.

B.

Revise the organization's security policy.

C.

Assess the consequences of noncompliance.

D.

Conduct an information security audit.

Buy Now
Question # 240

Which of the following BEST indicates the effectiveness of the vendor risk management process?

Options:

A.

Increase in the percentage of vendors certified to a globally recognized security standard

B.

Increase in the percentage of vendors with a completed due diligence review

C.

Increase in the percentage of vendors conducting mandatory security training

D.

Increase in the percentage of vendors that have reported security breaches

Buy Now
Question # 241

Which of the following is MOST relevant for an information security manager to communicate to the board of directors?

Options:

A.

The level of inherent risk

B.

Vulnerability assessments

C.

The level of exposure

D.

Threat assessments

Buy Now
Question # 242

Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?

Options:

A.

Information security program metrics

B.

Results of a recent external audit

C.

The information security operations matrix

D.

Changes to information security risks

Buy Now
Question # 243

The PRIMARY purpose for deploying information security metrics is to:

Options:

A.

compare program effectiveness to benchmarks.

B.

support ongoing security budget requirements.

C.

ensure that technical operations meet specifications.

D.

provide information needed to make decisions.

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Aug 1, 2025
Questions: 967
CISM pdf

CISM PDF

$69.65  $199
CISM Engine

CISM Testing Engine

$78.75  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$87.15  $249