Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CISM Exam Dumps - Isaca Certification Questions and Answers

Question # 244

In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.

Before relying on this certification, it is MOST important that the information security manager confirms that the:

Options:

A.

current international standard was used to assess security processes.

B.

certification will remain current through the life of the contract.

C.

certification scope is relevant to the service being offered.

D.

certification can be extended to cover the client's business.

Buy Now
Question # 245

Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?

Options:

A.

Enable multi-factor authentication on user and admin accounts.

B.

Review access permissions annually or whenever job responsibilities change

C.

Lock out accounts after a set number of unsuccessful login attempts.

D.

Delegate the management of access permissions to an independent third party.

Buy Now
Question # 246

Which of the following is MOST important for building 4 robust information security culture within an organization?

Options:

A.

Mature information security awareness training across the organization

B.

Strict enforcement of employee compliance with organizational security policies

C.

Security controls embedded within the development and operation of the IT environment

D.

Senior management approval of information security policies

Buy Now
Question # 247

Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?

Options:

A.

Mapping risk scenarios according to sensitivity of data

B.

Reviewing mitigating and compensating controls for each risk scenario

C.

Mapping the risk scenarios by likelihood and impact on a chart

D.

Performing a risk assessment on the laaS provider

Buy Now
Question # 248

Which of the following is MOST effective for communicating forward-looking trends within security reporting?

Options:

A.

Key control indicator (KCIs)

B.

Key risk indicators (KRIs)

C.

Key performance indicators (KPIs)

D.

Key goal indicators (KGIs)

Buy Now
Question # 249

An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?

Options:

A.

The total cost of the investment

B.

The cost and associated risk reduction

C.

The number and severity of ransomware incidents

D.

Benchmarks of industry peers impacted by ransomware

Buy Now
Question # 250

An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?

Options:

A.

Local regulations

B.

Data backup strategy

C.

Consistency in awareness programs

D.

Organizational reporting structure

Buy Now
Question # 251

While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?

Options:

A.

While responding to the incident

B.

During a tabletop exercise

C.

During post-incident review

D.

After a risk reassessment

Buy Now
Question # 252

An information security manager has identified that security risks are not being treated in a timely manner. Which of the following

Options:

A.

Provide regular updates about the current state of the risks.

B.

Re-perform risk analysis at regular intervals.

C.

Assign a risk owner to each risk

D.

Create mitigating controls to manage the risks.

Buy Now
Question # 253

Which of the following would BEST enable the timely execution of an incident response plan?

Options:

A.

The introduction of a decision support tool

B.

Definition of trigger events

C.

Clearly defined data classification process

D.

Centralized service desk

Buy Now
Question # 254

Which of the following is MOST important for the improvement of a business continuity plan (BCP)?

Options:

A.

Incorporating lessons learned

B.

Implementing an IT resilience solution

C.

Implementing management reviews

D.

Documenting critical business processes

Buy Now
Question # 255

Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?

Options:

A.

Computer forensics

B.

Continuous log monitoring

C.

Root cause analysis

D.

Penetration testing

Buy Now
Question # 256

When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?

Options:

A.

Business impact analysis (BIA) results

B.

Vulnerability assessment results

C.

The business continuity plan (BCP)

D.

Recommendations from senior management

Buy Now
Question # 257

Which of the following will ensure confidentiality of content when accessing an email system over the Internet?

Options:

A.

Multi-factor authentication

B.

Digital encryption

C.

Data masking

D.

Digital signatures

Buy Now
Question # 258

Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?

Options:

A.

Implement a mobile device policy and standard.

B.

Provide employee training on secure mobile device practices.

C.

Implement a mobile device management (MDM) solution.

D.

Require employees to install an effective anti-malware app.

Buy Now
Question # 259

Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?

Options:

A.

Risk assessment

B.

Business impact analysis (BIA)

C.

Penetration test results

D.

Vulnerability scan results

Buy Now
Question # 260

When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?

Options:

A.

Business impact analysis (BIA) results

B.

Key performance indicators (KPIs)

C.

Recovery procedures

D.

Systems inventory

Buy Now
Question # 261

Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:

Options:

A.

Tracked and reported on until their final resolution

B.

Noted and re-examined later if similar weaknesses are found

C.

Documented in security awareness programs

D.

Quickly resolved and eliminated regardless of cost

Buy Now
Question # 262

A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:

Options:

A.

developing a security program that meets global and regional requirements.

B.

ensuring effective communication with local regulatory bodies.

C.

using industry best practice to meet local legal regulatory requirements.

D.

monitoring compliance with defined security policies and standards.

Buy Now
Question # 263

When investigating an information security incident, details of the incident should be shared:

Options:

A.

widely to demonstrate positive intent.

B.

only with management.

C.

only as needed,

D.

only with internal audit.

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Aug 1, 2025
Questions: 967
CISM pdf

CISM PDF

$69.65  $199
CISM Engine

CISM Testing Engine

$78.75  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$87.15  $249