Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISM Exam Dumps - Isaca Certification Questions and Answers

Question # 244

Which of the following events would MOST likely require a revision to the information security program?

Options:

A.

An increase in industry threat level .

B.

A significant increase in reported incidents

C.

A change in IT management

D.

A merger with another organization

Buy Now
Question # 245

Prior to conducting a forensic examination, an information security manager should:

Options:

A.

boot the original hard disk on a clean system.

B.

create an image of the original data on new media.

C.

duplicate data from the backup media.

D.

shut down and relocate the server.

Buy Now
Question # 246

An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?

Options:

A.

Feedback from the vendor's previous clients

B.

Alignment of the vendor's business objectives with enterprise security goals

C.

The maturity of the vendor's internal control environment

D.

Penetration testing against the vendor's network

Buy Now
Question # 247

Which of the following should be the PRIMARY outcome of an information security program?

Options:

A.

Strategic alignment

B.

Risk elimination

C.

Cost reduction

D.

Threat reduction

Buy Now
Question # 248

Which is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?

Options:

A.

Parallel test

B.

Full interruption test

C.

Simulation test

D.

Tabletop test

Buy Now
Question # 249

An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:

Options:

A.

notify the business process owner.

B.

follow the business continuity plan (BCP).

C.

conduct an incident forensic analysis.

D.

follow the incident response plan.

Buy Now
Question # 250

The contribution of recovery point objective (RPO) to disaster recovery is to:

Options:

A.

minimize outage periods.

B.

eliminate single points of failure.

C.

define backup strategy

D.

reduce mean time between failures (MTBF).

Buy Now
Question # 251

Which of the following should be done FIRST when a SIEM flags a potential event?

Options:

A.

Validate the event is not a false positive.

B.

Initiate the incident response plan.

C.

Escalate the event to the business owner.

D.

Implement compensating controls.

Buy Now
Question # 252

Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?

Options:

A.

Security risk assessments

B.

Lessons learned analysis

C.

Information security audits

D.

Key performance indicators (KPIs)

Buy Now
Question # 253

When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?

Options:

A.

The information security strategy

B.

Losses due to security incidents

C.

The results of a risk assessment

D.

Security investment trends in the industry

Buy Now
Question # 254

An organization's research department plans to apply machine learning algorithms on a large data set containing customer names and purchase history. The risk of personal data leakage is considered high impact. Which of the following is the BEST risk treatment option in this situation?

Options:

A.

Accept the risk, as the benefits exceed the potential consequences.

B.

Mitigate the risk by applying anonymization on the data set.

C.

Transfer the risk by purchasing insurance.

D.

Mitigate the risk by encrypting the customer names in the data set.

Buy Now
Question # 255

The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:

Options:

A.

validate the confidentiality during analysis.

B.

reinstate original data when accidental changes occur.

C.

validate the integrity during analysis.

D.

provide backup in case of media failure.

Buy Now
Question # 256

The MOST important information for influencing management’s support of information security is:

Options:

A.

an demonstration of alignment with the business strategy.

B.

An identification of the overall threat landscape.

C.

A report of a successful attack on a competitor.

D.

An identification of organizational risks.

Buy Now
Question # 257

Which of the following processes is MOST important for the success of a business continuity plan (BCP)?

Options:

A.

Involving all stakeholders in testing and training

B.

Scheduling periodic internal and external audits

C.

Including the board and senior management in plan reviews

D.

Maintaining copies of the plan at the primary and recovery sites

Buy Now
Question # 258

Information security controls should be designed PRIMARILY based on:

Options:

A.

a business impact analysis (BIA).

B.

regulatory requirements.

C.

business risk scenarios,

D.

a vulnerability assessment.

Buy Now
Question # 259

Which of the following is the BEST justification for making a revision to a password policy?

Options:

A.

Vendor recommendation

B.

Audit recommendation

C.

A risk assessment

D.

Industry best practice

Buy Now
Question # 260

Embedding security responsibilities into job descriptions is important PRIMARILY because it:

Options:

A.

supports access management.

B.

simplifies development of the security awareness program.

C.

aligns security to the human resources (HR) function.

D.

strengthens employee accountability.

Buy Now
Question # 261

Who is accountable for approving an information security governance framework?

Options:

A.

The board of directors

B.

The chief information security officer (ClSO)

C.

The enterprise risk committee

D.

The chief information officer (CIO)

Buy Now
Question # 262

When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:

Options:

A.

expected duration of outage.

B.

management direction.

C.

type of security incident.

D.

the root cause of the event.

Buy Now
Question # 263

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

Options:

A.

Wipe and reset the endpoint device.

B.

Isolate the endpoint device.

C.

Power off the endpoint device.

D.

Run a virus scan on the endpoint device.

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Feb 20, 2026
Questions: 1044
CISM pdf

CISM PDF

$59.7  $199
CISM Engine

CISM Testing Engine

$67.5  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$74.7  $249