Pass4itsure > Isaca > Isaca Certifications > CISM > CISM Online Practice Questions and Answers

CISM Online Practice Questions and Answers

Questions 4

Acceptable risk is achieved when:

A. residual risk is minimized.

B. transferred risk is minimized.

C. control risk is minimized.

D. inherent risk is minimized.

Buy Now
Questions 5

The PRIMARY reason for assigning classes of sensitivity and criticality to information resources is to provide a basis for:

A. determining the scope for inclusion in an information security program.

B. defining the level of access controls.

C. justifying costs for information resources.

D. determining the overall budget of an information security program.

Buy Now
Questions 6

Management decisions concerning information security investments will be MOST effective when they are based on:

A. an annual loss expectancy (ALE) determined from the history of security events.

B. the formalized acceptance of risk analysis by management.

C. the reporting of consistent and periodic assessments of risks.

D. a process for identifying and analyzing threats and vulnerabilities.

Buy Now
Questions 7

Emergency actions are taken at the early stage of a disaster with the purpose of preventing injuries or loss of life and:

A. determining the extent of property damage.

B. preserving environmental conditions.

C. ensuring orderly plan activation.

D. reducing the extent of operational damage.

Buy Now
Questions 8

Which of the following is the MOST effective way to detect information security incidents?

A. Providing regular and up-to-date training for the incident response team

B. Establishing proper policies for response to threats and vulnerabilities

C. Performing regular testing of the incident response program

D. Educating and users on threat awareness and timely reporting

Buy Now
Questions 9

Which of the following is MOST likely to drive an update to the information security strategy?

A. A recent penetration test has uncovered a control weakness.

B. A major business application has been upgraded.

C. Management has decided to implement an emerging technology.

D. A new chief technology officer has been hired.

Buy Now
Questions 10

Which of the following has the GREATEST influence on the successful integration of information security within the business?

A. Organizational structure and culture

B. Risk tolerance and organizational objectives

C. The desired state of the organization

D. Information security personnel

Buy Now
Questions 11

Which of the following would MOST effectively ensure that a new server is appropriately secured?

A. Performing secure code reviews

B. Enforcing technical security standards

C. Conducting penetration testing

D. Initiating security scanning

Buy Now
Questions 12

Which of the following is MOST helpful in determining whether a phishing email is malicious?

A. Security awareness training

B. Reverse engineering

C. Threat intelligence

D. Sandboxing

Buy Now
Questions 13

An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident it is MOST important for the security manager to:

A. notify the business process owner.

B. follow the business continuity plan (BCP).

C. conduct an incident forensic analysis.

D. follow the incident response plan.

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Jan 03, 2025
Questions: 1983
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99