Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISM Exam Dumps - Isaca Certification Questions and Answers

Question # 84

Which of the following would BEST enable the help desk to recognize an information security incident?

Options:

A.

Train the help desk to review the call logs.

B.

Require the help desk to participate in post-incident reviews.

C.

Provide the help desk with criteria for security incidents.

D.

Include members of the help desk on the security incident response team.

Buy Now
Question # 85

Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?

Options:

A.

Mail relay server

B.

Proxy server

C.

Database server

D.

Application server

Buy Now
Question # 86

Which of the following BEST facilitates the effectiveness of cybersecurity incident response?

Options:

A.

Utilizing a security information and event management (SIEM) tool.

B.

Utilizing industry-leading network penetration testing tools.

C.

Increasing communication with all incident response stakeholders.

D.

Continuously updating signatures of the anti-malware solution.

Buy Now
Question # 87

During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:

Options:

A.

baseline security controls.

B.

benchmarking security metrics.

C.

security objectives.

D.

cost-benefit analyses.

Buy Now
Question # 88

An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:

Options:

A.

organizational alignment

B.

IT strategy alignment

C.

threats to the organization

D.

existing control costs

Buy Now
Question # 89

The fundamental purpose of establishing security metrics is to:

Options:

A.

increase return on investment (ROI)

B.

provide feedback on control effectiveness

C.

adopt security best practices

D.

establish security benchmarks

Buy Now
Question # 90

Which of the following BEST enables an organization to determine the costs of downtime for a critical application?

Options:

A.

Fault tree analysis

B.

Cost-benefit analysis

C.

Return on investment (ROI) analysis

D.

Business impact analysis (BIA)

Buy Now
Question # 91

Which of the following is the MOST common cause of cybersecurity breaches?

Options:

A.

Lack of adequate password rotation

B.

Human error

C.

Abuse of privileged accounts

D.

Lack of control baselines

Buy Now
Question # 92

Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?

Options:

A.

Establishing risk metrics

B.

Training on risk management procedures

C.

Reporting on documented deficiencies

D.

Assigning a risk owner

Buy Now
Question # 93

The PRIMARY objective of performing a post-incident review is to:

Options:

A.

re-evaluate the impact of incidents.

B.

identify vulnerabilities.

C.

identify control improvements.

D.

identify the root cause.

Buy Now
Question # 94

Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?

Options:

A.

Defining information stewardship roles

B.

Defining security asset categorization

C.

Assigning information asset ownership

D.

Developing a records retention schedule

Buy Now
Question # 95

Which of the following is the FIRST step in developing a business continuity plan (BCP)?

Options:

A.

Determine the business recovery strategy

B.

Determine available resources.

C.

Identify the applications with the shortest recovery time objectives (RTOs).

D.

Identify critical business processes.

Buy Now
Question # 96

Which of the following should have the MOST influence on the development of information security policies?

Options:

A.

Business strategy

B.

Past and current threats

C.

IT security framework

D.

Industry standards

Buy Now
Question # 97

When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?

Options:

A.

Business process owner

B.

Business continuity coordinator

C.

Senior management

D.

Information security manager

Buy Now
Question # 98

Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?

Options:

A.

Threat analytics software

B.

Host intrusion detection system

C.

SIEM

D.

Network intrusion detection system

Buy Now
Question # 99

Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?

Options:

A.

Security policy

B.

Risk management framework

C.

Risk appetite

D.

Security standards

Buy Now
Question # 100

The PRIMARY benefit of integrating information security activities into change management processes is to:

Options:

A.

protect the organization from unauthorized changes.

B.

ensure required controls are included in changes.

C.

provide greater accountability for security-related changes in the business.

D.

protect the business from collusion and compliance threats.

Buy Now
Question # 101

Which type of system is MOST effective for prioritizing cyber incidents based on impact and tracking them until they are closed?

Options:

A.

Security information and event management (SIEM)

B.

Extended detection and response (XDR)

C.

Endpoint detection and response (EDR)

D.

Network intrusion detection system (NIDS)

Buy Now
Question # 102

When analyzing the emerging risk and threat landscape, an information security manager should FIRST:

Options:

A.

determine the impact if threats materialize.

B.

determine the sources of emerging threats.

C.

review historical threats within the industry.

D.

map threats to business assets.

Buy Now
Question # 103

Which of the following is MOST important to the ongoing success of an information security program?

Options:

A.

Executive sponsorship

B.

Skilled personnel

C.

Process automation

D.

Regular awareness training

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Feb 20, 2026
Questions: 1044
CISM pdf

CISM PDF

$59.7  $199
CISM Engine

CISM Testing Engine

$67.5  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$74.7  $249