Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISM Exam Dumps - Isaca Certification Questions and Answers

Question # 124

Which of the following BEST enables the integration of information security governance into corporate governance?

Options:

A.

Well-decumented information security policies and standards

B.

An information security steering committee with business representation

C.

Clear lines of authority across the organization

D.

Senior management approval of the information security strategy

Buy Now
Question # 125

Which of the following BEST enables users to recover from ransomware or malware attacks?

Options:

A.

Incident response plans

B.

Frequent system backups

C.

Regular antivirus updates

D.

End-user awareness training

Buy Now
Question # 126

Which of the following is the BEST indication of a mature information security program?

Options:

A.

Security incidents are managed properly.

B.

Security spending is below budget.

C.

Security resources are optimized.

D.

Security audit findings are reduced.

Buy Now
Question # 127

Which of the following is the MOST effective way to demonstrate improvement in security performance?

Options:

A.

Report the results of a security control self-assessment (CSA).

B.

Provide a summary of security project return on investments (ROIs).

C.

Present vulnerability testing results.

D.

Present trends in a validated metrics dashboard.

Buy Now
Question # 128

Which of the following has the GREATEST influence on the successful integration of information security within the business?

Options:

A.

Organizational structure and culture

B.

Risk tolerance and organizational objectives

C.

The desired state of the organization

D.

Information security personnel

Buy Now
Question # 129

An organization is considering using a third party to host sensitive archived data. Which of the following is MOST important to verify before entering into the relationship?

Options:

A.

The vendor's data centers are in the same geographic region.

B.

The encryption keys are not provisled to the vendor.

C.

The vendor's controls are in line with the organization's security standards.

D.

Independent audits of the vendor's operations are regularly conducted.

Buy Now
Question # 130

Which of the following is the MOST important reason for logging firewall activity?

Options:

A.

Metrics reporting

B.

Firewall tuning

C.

Intrusion prevention

D.

Incident investigation

Buy Now
Question # 131

Which of the following is the PRIMARY reason to use a phased incident recovery approach?

Options:

A.

To gain management buy-in

B.

To give the response team time to analyze incidents

C.

To ensure critical systems are recovered first

D.

To prioritize remediation steps

Buy Now
Question # 132

An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?

Options:

A.

Escalate to the chief risk officer (CRO).

B.

Conduct a vulnerability analysis.

C.

Conduct a risk analysis.

D.

Determine compensating controls.

Buy Now
Question # 133

The GREATEST benefit of an effective information security awareness program is the organization’s ability to:

Options:

A.

Meet compliance requirements

B.

Reduce security incidents

C.

Establish accountability

D.

Develop meaningful metrics

Buy Now
Question # 134

In a call center, the BEST reason to conduct a social engineering is to:

Options:

A.

Identify candidates for additional security training.

B.

minimize the likelihood of successful attacks.

C.

gain funding for information security initiatives.

D.

improve password policy.

Buy Now
Question # 135

Which of the following would BEST guide the development and maintenance of an information security program?

Options:

A.

A business impact assessment

B.

A comprehensive risk register

C.

An established risk assessment process

D.

The organization's risk appetite

Buy Now
Question # 136

A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:

Options:

A.

incident has been confirmed.

B.

incident has been contained.

C.

potential incident has been logged.

D.

incident has been mitigated.

Buy Now
Question # 137

Which of the following is the PRIMARY benefit of an information security awareness training program?

Options:

A.

Influencing human behavior

B.

Evaluating organizational security culture

C.

Defining risk accountability

D.

Enforcing security policy

Buy Now
Question # 138

Which of the following is the PRIMARY role of an information security manager in a software development project?

Options:

A.

To enhance awareness for secure software design

B.

To assess and approve the security application architecture

C.

To identify noncompliance in the early design stage

D.

To identify software security weaknesses

Buy Now
Question # 139

After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?

Options:

A.

Calculating cost of the incident

B.

Conducting a postmortem assessment

C.

Performing an impact analysis

D.

Preserving the evidence

Buy Now
Question # 140

Which of the following is MOST important for an information security manager to consider when reviewing a security investment plan?

Options:

A.

The plan has summarized IT costs for implementation.

B.

The plan resolves all potential threats to business processes.

C.

The plan focuses on meeting industry best practices and industry standards.

D.

The plan is based on a review of threats and vulnerabilities.

Buy Now
Question # 141

Network isolation techniques are immediately implemented after a security breach to:

Options:

A.

preserve evidence as required for forensics

B.

reduce the extent of further damage.

C.

allow time for key stakeholder decision making.

D.

enforce zero trust architecture principles.

Buy Now
Question # 142

Which of the following should be an information security manager s MOST important consideration when determining the priority for implementing security controls?

Options:

A.

Alignment with industry benchmarks

B.

Results of business impact analyses (BIAs)

C.

Possibility of reputational loss due to incidents

D.

Availability of security budget

Buy Now
Question # 143

Which of the following should be of GREATEST concern regarding an organization's security controls?

Options:

A.

Some controls are performing outside of an acceptable range.

B.

No key control indicators (KCIs) have been implemented.

C.

Control ownership has not been updated.

D.

Control gap analysis is outdated.

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Feb 20, 2026
Questions: 1044
CISM pdf

CISM PDF

$59.7  $199
CISM Engine

CISM Testing Engine

$67.5  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$74.7  $249