Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISM Exam Dumps - Isaca Certification Questions and Answers

Question # 64

When developing a categorization method for security incidents, the categories MUST:

Options:

A.

align with industry standards.

B.

be created by the incident handler.

C.

have agreed-upon definitions.

D.

align with reporting requirements.

Buy Now
Question # 65

What will BEST facilitate the success of new security initiatives?

Options:

A.

Establish an IT security steering committee.

B.

Include business in security decision making.

C.

Update security policies on a regular basis

D.

Monitor post-implementation security metrics.

Buy Now
Question # 66

During which phase of an incident response plan is the root cause determined?

Options:

A.

Recovery

B.

Lessons learned

C.

Containment

D.

Eradication

Buy Now
Question # 67

Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?

Options:

A.

IT strategy

B.

Recovery strategy

C.

Risk mitigation strategy

D.

Security strategy

Buy Now
Question # 68

Which of the following is the MOST effective way to detect information security incidents?

Options:

A.

Implementation of regular security awareness programs

B.

Periodic analysis of security event log records

C.

Threshold settings on key risk indicators (KRIs)

D.

Real-time monitoring of network activity

Buy Now
Question # 69

An information security program is BEST positioned for success when it is closely aligned with:

Options:

A.

information security best practices.

B.

recognized industry frameworks.

C.

information security policies.

D.

the information security strategy.

Buy Now
Question # 70

A KEY consideration in the use of quantitative risk analysis is that it:

Options:

A.

aligns with best practice for risk analysis of information assets.

B.

assigns numeric values to exposures of information assets.

C.

applies commonly used labels to information assets.

D.

is based on criticality analysis of information assets.

Buy Now
Question # 71

From an information security perspective, legal issues associated with a transborder flow of technology-related items are MOST often

Options:

A.

website transactions and taxation.

B.

software patches and corporate date.

C.

encryption tools and personal data.

D.

lack of competition and free trade.

Buy Now
Question # 72

An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:

Options:

A.

determine the security exposures.

B.

assess the ability to integrate the security department operations.

C.

ensure compliance with international standards.

D.

evaluate the security policy and standards.

Buy Now
Question # 73

Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?

Options:

A.

To facilitate a qualitative risk assessment following the BIA

B.

To increase awareness of information security among key stakeholders

C.

To ensure the stakeholders providing input own the related risk

D.

To obtain input from as many relevant stakeholders as possible

Buy Now
Question # 74

Which of the following is MOST important to include in an information security policy?

Options:

A.

Best practices

B.

Management objectives

C.

Baselines

D.

Maturity levels

Buy Now
Question # 75

Identifying which of the following BEST enables a cyberattack to be contained?

Options:

A.

The vulnerability exploited by the attack

B.

The segment targeted by the attack

C.

The IP address of the computer that launched the attack

D.

The threat actor that initiated the attack

Buy Now
Question # 76

Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?

Options:

A.

Include the impact of the risk as part of regular metrics.

B.

Recommend the security steering committee conduct a review.

C.

Update the risk assessment at regular intervals

D.

Send regular notifications directly to senior managers

Buy Now
Question # 77

Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?

Options:

A.

Compartmentalization

B.

Overlapping redundancy

C.

Continuous monitoring

D.

Multi-factor authentication

Buy Now
Question # 78

Which of the following elements of a service contract would BEST enable an organization to monitor the information security risk associated with a cloud service provider?

Options:

A.

Indemnification clause

B.

Breach detection and notification

C.

Compliance status reporting

D.

Physical access to service provider premises

Buy Now
Question # 79

After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?

Options:

A.

EradicationB Recovery

B.

Lessons learned review

C.

Incident declaration

Buy Now
Question # 80

Which of the following is the GREATEST benefit of using AI tools in security operations?

Options:

A.

Rapid detection and response to threats

B.

Prioritized vulnerabilities

C.

Reduced time and effort required to patch systems

D.

Defined risk tolerance

Buy Now
Question # 81

Which of the following should be done FIRST when developing a business continuity plan (BCP)?

Options:

A.

Review current recovery policies.

B.

Define the organizational strategy.

C.

Prioritize the critical processes.

D.

Review existing cyber insurance coverage.

Buy Now
Question # 82

An organization wants to migrate a proprietary application to be hosted by a third-party cloud hosting provider using a Platform as a Service (PaaS) model. Prior to selecting the cloud provider, what is MOST important for the organization to ensure?

Options:

A.

The cloud provider can meet recovery point objectives (RPOs).

B.

The cloud provider adheres to applicable regulations.

C.

The cloud provider’s service level agreement (SLA) includes availability requirements.

D.

The hosting contract has a termination clause.

Buy Now
Question # 83

Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:

Options:

A.

a function of the likelihood and impact, should a threat exploit a vulnerability.

B.

the magnitude of the impact, should a threat exploit a vulnerability.

C.

a function of the cost and effectiveness of controls over a vulnerability.

D.

the likelihood of a given threat attempting to exploit a vulnerability

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Feb 20, 2026
Questions: 1044
CISM pdf

CISM PDF

$59.7  $199
CISM Engine

CISM Testing Engine

$67.5  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$74.7  $249