Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CISM Exam Dumps - Isaca Certification Questions and Answers

Question # 144

Which of the following is the BEST way to ensure the capability to restore clean data after a ransomware attack?

Options:

A.

Purchase cyber insurance

B.

Encrypt sensitive production data

C.

Perform Integrity checks on backups

D.

Maintain multiple offline backups

Buy Now
Question # 145

Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:

Options:

A.

Tracked and reported on until their final resolution

B.

Noted and re-examined later if similar weaknesses are found

C.

Documented in security awareness programs

D.

Quickly resolved and eliminated regardless of cost

Buy Now
Question # 146

Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?

Options:

A.

Consult with IT staff and assess the risk based on their recommendations

B.

Update the security policy based on the regulatory requirements

C.

Propose relevant controls to ensure the business complies with the regulation

D.

Identify and assess the risk in the context of business objectives

Buy Now
Question # 147

Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?

Options:

A.

Business impact analysis (BIA)

B.

Risk register

C.

Penetration testing

D.

Vulnerability assessment

Buy Now
Question # 148

Which of the following should be triggered FIRST when unknown malware has infected an organization's critical system?

Options:

A.

Incident response plan

B.

Disaster recovery plan (DRP)

C.

Business continuity plan (BCP)

D.

Vulnerability management plan

Buy Now
Question # 149

When integrating security risk management into an organization it is MOST important to ensure:

Options:

A.

business units approve the risk management methodology.

B.

the risk treatment process is defined.

C.

information security policies are documented and understood.

D.

the risk management methodology follows an established framework.

Buy Now
Question # 150

An organization is MOST likely to accept the risk of noncompliance with a new regulatory requirement when:

Options:

A.

employees are resistant to the controls required by the new regulation.

B.

the regulatory requirement conflicts with business requirements.

C.

the risk of noncompliance exceeds the organization's risk appetite.

D.

the cost of complying with the regulation exceeds the potential penalties.

Buy Now
Question # 151

Recommendations for enterprise investment in security technology should be PRIMARILY based on:

Options:

A.

adherence to international standards

B.

availability of financial resources

C.

the organization s risk tolerance

D.

alignment with business needs

Buy Now
Question # 152

Which of the following is the BEST course of action for an information security manager to align security and business goals?

Options:

A.

Conducting a business impact analysis (BIA)

B.

Reviewing the business strategy

C.

Defining key performance indicators (KPIs)

D.

Actively engaging with stakeholders

Buy Now
Question # 153

Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?

Options:

A.

Enhanced data governance

B.

Increased third-party assurance

C.

)Improved incident management

D.

Reduced total cost of ownership (TCO)

Buy Now
Question # 154

Which of the following is the GREATEST challenge when developing key risk indicators (KRIs)?

Options:

A.

Limiting the number of KRIs

B.

Comprehensively reporting on KRIs

C.

Aggregating common KRIs

D.

Linking KRIs to specific risks

Buy Now
Question # 155

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

Options:

A.

Wipe and reset the endpoint device.

B.

Isolate the endpoint device.

C.

Power off the endpoint device.

D.

Run a virus scan on the endpoint device.

Buy Now
Question # 156

Which of the following defines the triggers within a business continuity plan (BCP)? @

Options:

A.

Needs of the organization

B.

Disaster recovery plan (DRP)

C.

Information security policy

D.

Gap analysis

Buy Now
Question # 157

An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:

Options:

A.

disable the user's access to corporate resources.

B.

terminate the device connectivity.

C.

remotely wipe the device

D.

escalate to the user's management

Buy Now
Question # 158

A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:

Options:

A.

require that the change be reversed

B.

review the change management process

C.

perform an analysis of the change

D.

report the event to senior management

Buy Now
Question # 159

Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?

Options:

A.

Threat management is enhanced.

B.

Compliance status is improved.

C.

Security metrics are enhanced.

D.

Proactive risk management is facilitated.

Buy Now
Question # 160

Which of the following should be the FIRST step in developing an information security strategy?

Options:

A.

Perform a gap analysis based on the current state

B.

Create a roadmap to identify security baselines and controls.

C.

Identify key stakeholders to champion information security.

D.

Determine acceptable levels of information security risk.

Buy Now
Question # 161

The PRIMARY advantage of single sign-on (SSO) is that it will:

Options:

A.

increase efficiency of access management

B.

increase the security of related applications.

C.

strengthen user passwords.

D.

support multiple authentication mechanisms.

Buy Now
Question # 162

Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?

Options:

A.

Align the standards with the organizational policy.

B.

Align the standards with industry best practices.

C.

Resolve the discrepancy before developing the standards.

D.

Perform a cost-benefit analysis of aligning the standards to policy.

Buy Now
Question # 163

An organization is considering using a third party to host sensitive archived data. Which of the following is MOST important to verify before entering into the relationship?

Options:

A.

The vendor's data centers are in the same geographic region.

B.

The encryption keys are not provisled to the vendor.

C.

The vendor's controls are in line with the organization's security standards.

D.

Independent audits of the vendor's operations are regularly conducted.

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Jun 15, 2025
Questions: 920
CISM pdf

CISM PDF

$69.65  $199
CISM Engine

CISM Testing Engine

$78.75  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$87.15  $249