Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISM Exam Dumps - Isaca Certification Questions and Answers

Question # 214

The PRIMARY reason for creating a business case when proposing an information security project is to:

Options:

A.

articulate inherent risks.

B.

provide demonstrated return on investment (ROI).

C.

establish the value of the project in relation to business objectives.

D.

gain key business stakeholder engagement.

Buy Now
Question # 215

Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?

Options:

A.

Data owner

B.

Business owner

C.

Information security manager

D.

Compliance manager

Buy Now
Question # 216

An incident response team has established that an application has been breached. Which of the following should be done NEXT?

Options:

A.

Maintain the affected systems in a forensically acceptable state

B.

Conduct a risk assessment on the affected application

C.

Inform senior management of the breach.

D.

Isolate the impacted systems from the rest of the network

Buy Now
Question # 217

To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?

Options:

A.

Data storage procedures

B.

Data classification policy

C.

Results of penetration testing

D.

Features of data protection products

Buy Now
Question # 218

Identifying which of the following BEST enables a cyberattack to be contained?

Options:

A.

The vulnerability exploited by the attack

B.

The segment targeted by the attack

C.

The IP address of the computer that launched the attack

D.

The threat actor that initiated the attack

Buy Now
Question # 219

In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or

Options:

A.

Security budget

B.

Risk register

C.

Risk score

D.

Laws and regulations

Buy Now
Question # 220

When assigning a risk owner, the MOST important consideration is to ensure the owner has:

Options:

A.

adequate knowledge of risk treatment and related control activities.

B.

decision-making authority and the ability to allocate resources for risk.

C.

sufficient time for monitoring and managing the risk effectively.

D.

risk communication and reporting skills to enable decision-making.

Buy Now
Question # 221

During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?

Options:

A.

Configuration management

B.

Password management

C.

Change management

D.

Version management

Buy Now
Question # 222

For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:

Options:

A.

consistent security.

B.

comprehensive audits

C.

a security-aware culture

D.

compliance with policy

Buy Now
Question # 223

When integrating security risk management into an organization it is MOST important to ensure:

Options:

A.

business units approve the risk management methodology.

B.

the risk treatment process is defined.

C.

information security policies are documented and understood.

D.

the risk management methodology follows an established framework.

Buy Now
Question # 224

An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?

Options:

A.

Allow the practice to continue temporarily for monitoring purposes.

B.

Disable the employees' remote access to company email and data

C.

Initiate remote wipe of the devices

D.

Assess the business need to provide a secure solution

Buy Now
Question # 225

Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?

Options:

A.

Reducing the number of vulnerabilities detected

B.

Ensuring the amount of residual risk is acceptable

C.

Avoiding identified system threats

D.

Complying with regulatory requirements

Buy Now
Question # 226

The MOST useful technique for maintaining management support for the information security program is:

Options:

A.

informing management about the security of business operations.

B.

implementing a comprehensive security awareness and training program.

C.

identifying the risks and consequences of failure to comply with standards.

D.

benchmarking the security programs of comparable organizations.

Buy Now
Question # 227

Which of the following should include contact information for representatives of equipment and software vendors?

Options:

A.

Information security program charter

B.

Business impact analysis (BIA)

C.

Service level agreements (SLAs)

D.

Business continuity plan (BCP)

Buy Now
Question # 228

Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:

Options:

A.

a function of the likelihood and impact, should a threat exploit a vulnerability.

B.

the magnitude of the impact, should a threat exploit a vulnerability.

C.

a function of the cost and effectiveness of controls over a vulnerability.

D.

the likelihood of a given threat attempting to exploit a vulnerability

Buy Now
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Feb 23, 2025
Questions: 801
CISM pdf

CISM PDF

$59.7  $199
CISM Engine

CISM Testing Engine

$67.5  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$74.7  $249