Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CISM Exam Dumps - Isaca Certification Questions and Answers

Question # 164

Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?

Options:

A.

The strategy aligns with management’s acceptable level of risk.

B.

The strategy addresses ineffective information security controls.

C.

The strategy aligns with industry benchmarks and standards.

D.

The strategy addresses organizational maturity and the threat environment.

Buy Now
Question # 165

Which of the following documents should contain the INITIAL prioritization of recovery of services?

Options:

A.

IT risk analysis

B.

Threat assessment

C.

Business impact analysis (BIA)

D.

Business process map

Buy Now
Question # 166

An organization has remediated a security flaw in a system. Which of the following should be done NEXT?

Options:

A.

Assess the residual risk.

B.

Share lessons learned with the organization.

C.

Update the system's documentation.

D.

Allocate budget for penetration testing.

Buy Now
Question # 167

After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?

Options:

A.

Calculating cost of the incident

B.

Conducting a postmortem assessment

C.

Performing an impact analysis

D.

Preserving the evidence

Buy Now
Question # 168

Which of the following is the BEST way to build a risk-aware culture?

Options:

A.

Periodically change risk awareness messages.

B.

Ensure that threats are documented and communicated in a timely manner.

C.

Establish a channel for staff to report risks.

D.

Periodically test compliance with security controls.

Buy Now
Question # 169

Which of the following metrics provides the BEST evidence of alignment of information security governance with corporate governance?

Options:

A.

Average return on investment (ROI) associated with security initiatives

B.

Average number of security incidents across business units

C.

Mean time to resolution (MTTR) for enterprise-wide security incidents

D.

Number of vulnerabilities identified for high-risk information assets

Buy Now
Question # 170

Which of the following is MOST important to ensure incident management readiness?

Options:

A.

The plan is compliant with industry standards.

B.

The plan is regularly tested.

C.

The plan is updated annually.

D.

The plan is concise and includes a checklist.

Buy Now
Question # 171

Which of the following is the MOST important detail to capture in an organization's risk register?

Options:

A.

Risk appetite

B.

Risk severity level

C.

Risk acceptance criteria

D.

Risk ownership

Buy Now
Question # 172

Which of the following is the MOST effective way to increase security awareness in an organization?

Options:

A.

Implement regularly scheduled information security audits.

B.

Require signed acknowledgment of information security policies.

C.

Conduct periodic simulated phishing exercises.

D.

Include information security requirements in job descriptions.

Buy Now
Question # 173

Which of the following should be the MOST important consideration of business continuity management?

Options:

A.

Ensuring human safety

B.

Identifying critical business processes

C.

Ensuring the reliability of backup data

D.

Securing critical information assets

Buy Now
Question # 174

Embedding security responsibilities into job descriptions is important PRIMARILY because it:

Options:

A.

supports access management.

B.

simplifies development of the security awareness program.

C.

aligns security to the human resources (HR) function.

D.

strengthens employee accountability.

Buy Now
Question # 175

Which of the following should an information security manager do FIRST when noncompliance with security standards is identified?

Options:

A.

Report the noncompliance to senior management.

B.

Validate the noncompliance.

C.

Include the noncompliance in the risk register.

D.

Implement compensating controls to mitigate the noncompliance.

Buy Now
Question # 176

Which of the following is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?

Options:

A.

To compare emerging trends with the existing organizational security posture

B.

To communicate worst-case scenarios to senior management

C.

To train information security professionals to mitigate new threats

D.

To determine opportunities for expanding organizational information security

Buy Now
Question # 177

Which of the following will result in the MOST accurate controls assessment?

Options:

A.

Mature change management processes

B.

Senior management support

C.

Well-defined security policies

D.

Unannounced testing

Buy Now
Question # 178

Which of the following is the BEST method for determining whether a firewall has been configured to provide a comprehensive perimeter defense9

Options:

A.

A validation of the current firewall rule set

B.

A port scan of the firewall from an internal source

C.

A ping test from an external source

D.

A simulated denial of service (DoS) attack against the firewall

Buy Now
Question # 179

Which of the following BEST demonstrates the added value of an information security program?

Options:

A.

Security baselines

B.

A gap analysis

C.

A SWOT analysis

D.

A balanced scorecard

Buy Now
Question # 180

Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?

Options:

A.

Disaster recovery plan (DRP)

B.

Incident response plan

C.

Business continuity plan (BCP)

D.

Business contingency plan

Buy Now
Question # 181

The results of a risk assessment for a potential network reconfiguration reveal a high likelihood of sensitive data being compromised. What is the information security manager's BEST course of

action?

Options:

A.

Recommend additional network segmentation.

B.

Seek an independent opinion to confirm the findings.

C.

Determine alignment with existing regulations.

D.

Report findings to key stakeholders.

Buy Now
Question # 182

Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?

Options:

A.

Statistical reports will be incorrect.

B.

The service desk will be staffed incorrectly.

C.

Escalation procedures will be ineffective.

D.

Timely detection of attacks will be impossible.

Buy Now
Question # 183

Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?

Options:

A.

Risk heat map.

B.

Security benchmark report.

C.

Security metrics dashboard.

D.

Key risk indicators (KRIs).

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Jun 15, 2025
Questions: 920
CISM pdf

CISM PDF

$69.65  $199
CISM Engine

CISM Testing Engine

$78.75  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$87.15  $249