Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CISM Exam Dumps - Isaca Certification Questions and Answers

Question # 44

Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?

Options:

A.

Inform the public relations officer.

B.

Monitor the third party's response.

C.

Invoke the incident response plan.

D.

Inform customers of the breach.

Buy Now
Question # 45

An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?

Options:

A.

Provide additional training to the incident response team.

B.

Review the incident management procedures.

C.

Interview the incident response team.

D.

Remove the steps from the incident management procedures.

Buy Now
Question # 46

When determining an acceptable risk level which of the following is the MOST important consideration?

Options:

A.

Threat profiles

B.

System criticalities

C.

Vulnerability scores

D.

Risk matrices

Buy Now
Question # 47

Which of the following is the BEST way to build a risk-aware culture?

Options:

A.

Periodically change risk awareness messages.

B.

Ensure that threats are documented and communicated in a timely manner.

C.

Establish a channel for staff to report risks.

D.

Periodically test compliance with security controls.

Buy Now
Question # 48

Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?

Options:

A.

Management's business goals and objectives

B.

Strategies of other non-regulated companies

C.

Risk assessment results

D.

Industry best practices and control recommendations

Buy Now
Question # 49

What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?

Options:

A.

Vendor service level agreements (SLAs)

B.

Independent review of the vendor

C.

Local laws and regulations

D.

Backup and restoration of data

Buy Now
Question # 50

An organization has just updated its backup capability to a new cloud-based solution. Which of the following tests will MOST effectively verify this change is working as intended?

Options:

A.

Tabletop testing

B.

Black box testing

C.

Parallel testing

D.

Simulation testing

Buy Now
Question # 51

Which of the following should an information security manager do FIRST after a new cybersecunty regulation has been introduced?

Options:

A.

Conduct a cost-benefit analysis.

B.

Consult corporate legal counsel

C.

Update the information security policy.

D.

Perform a gap analysis.

Buy Now
Question # 52

An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?

Options:

A.

Install the OS, patches, and application from the original source.

B.

Restore the OS, patches, and application from a backup.

C.

Restore the application and data from a forensic copy.

D.

Remove all signs of the intrusion from the OS and application.

Buy Now
Question # 53

An information security manager has learned of an increasing trend in attacks that use phishing emails impersonating an organization's CEO in an attempt to commit wire transfer fraud. Which of the following is the BEST way to reduce the risk associated with this type of attack?

Options:

A.

Temporarily suspend wire transfers for the organization.

B.

Provide awareness training to the CEO for this type of phishing attack.

C.

Provide awareness training to staff responsible for wire transfers.

D.

Disable emails for staff responsible for wire transfers.

Buy Now
Question # 54

Which of the following would BEST support the business case for an increase in the information security budget?

Options:

A.

Cost-benefit analysis results

B.

Comparison of information security budgets with peer organizations

C.

Business impact analysis (BIA) results

D.

Frequency of information security incidents

Buy Now
Question # 55

Which of the following is MOST important to consider when determining asset valuation?

Options:

A.

Asset recovery cost

B.

Asset classification level

C.

Cost of insurance premiums

D.

Potential business loss

Buy Now
Question # 56

Which of the following should be done FIRST when implementing a security program?

Options:

A.

Perform a risk analysis

B.

Implement data encryption.

C.

Create an information asset inventory.

D.

Determine the value of information assets.

Buy Now
Question # 57

An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?

Options:

A.

Escalate to the chief risk officer (CRO).

B.

Conduct a vulnerability analysis.

C.

Conduct a risk analysis.

D.

Determine compensating controls.

Buy Now
Question # 58

For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?

Options:

A.

Centralized logging

B.

Time clock synchronization

C.

Available forensic tools

D.

Administrator log access

Buy Now
Question # 59

The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:

Options:

A.

the organization has the required funds to implement the plan.

B.

compliance with legal and regulatory requirements.

C.

staff participation in information security efforts.

D.

the plan aligns with corporate governance.

Buy Now
Question # 60

Which of the following BEST helps to enable the desired information security culture within an organization?

Options:

A.

Information security awareness training and campaigns

B.

Effective information security policies and procedures

C.

Delegation of information security roles and responsibilities

D.

Incentives for appropriate information security-related behavior

Buy Now
Question # 61

Senior management is concerned about data exposure through the use of public Al services. Which of the following is the information security manager's BEST course of action?

Options:

A.

Train all employees on the appropriate use of public Al services and confidential data.

B.

Disable access to public Al from company devices.

C.

Perform a risk assessment of public Al with appropriate recommendations for senior management.

D.

Perform a business impact analysis (BIA) of public Al.

Buy Now
Question # 62

Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?

Options:

A.

Risk assessment results

B.

Audit findings

C.

Key risk indicators (KRIs)

D.

Baseline controls

Buy Now
Question # 63

A new information security reporting requirement will soon become effective. Which of the following should be the information security manager's FIRST action?

Options:

A.

Conduct a cost-benefit analysis related to noncompliance with the new requirement.

B.

Perform a gap assessment against the new requirement.

C.

Investigate to determine whether the new requirement applies to the business.

D.

Inform senior management of the new requirement.

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Jul 31, 2025
Questions: 967
CISM pdf

CISM PDF

$69.65  $199
CISM Engine

CISM Testing Engine

$78.75  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$87.15  $249