Isaca: Questions & Answers (Demo Version - Limited Content)
Isaca: Questions & Answers (Demo Version - Limited Content)
CISM
Exam Name:
Certified Information Security Manager
Question: 1
Which of the following metrics would be considered an accurate measure of an information security
program's performance?
A. The number of key risk indicators (KRIs) identified, monitored, and acted upon
B. A collection of qualitative indicators that accurately measure security exceptions
C. A combination of qualitative and quantitative trends that enable decision making
D. A single numeric score derived from various measures assigned to the security program
Answer: A
Question: 2
Which of the following BEST ensures timely and reliable access to services?
A. Nonrepudiation
B. Recovery lime objective (RTO)
C. Availability
D. Authenticity
Answer: B
Question: 3
When trying to integrate information security across an organization, the MOST important goal for a
governing body should be to ensure:
Answer: D
Question: 4
Page | 2
D. perform a security gap analysis on the competitor.
Answer: B
Question: 5
Which of the following would be the MOST effective incident response team structure for an
organization with a large headquarters and worldwide branch offices?
A. Coordinated
B. Decentralized
C. Outsourced
D. Centralized
Answer: D
Question: 6
Which of the following is MOST helpful for prioritizing the recovery of IT assets during a disaster?
A. Vulnerability assessment
B. Business impact analysis (BIA)
C. Cost- benefit analysis
D. Risk assessment
Answer: B
Question: 7
Answer: A
Question: 8
Answer: A
Question: 9
Page | 3
Which of the following is the BEST strategy to implement an effective operational security posture?
A. Defense in depth
B. Threat management
C. Vulnerability management
D. Increased security awareness
Answer: D
Question: 10
Which of the following is the PRIMARY reason to conduct periodic business impact assessments?
Answer: A
Question: 11
Which of the following is the BEST way to address any gaps identified during an outsourced provider
selection and contract negotiation process?
Answer: A
Question: 12
When facilitating the alignment of corporate governance and information security governance,
which of the following is the MOST important role of an organizations security steering committee?
Answer: D
Question: 13
An information security manager is evaluating the key risk indicators (KRls) for an organization s
information security program. Which of the following would be the information security manager s
GREATEST concern?
Page | 4
A. Use of qualitative measures
B. Multiple KRls for a single control process
C. Undefined thresholds to trigger alerts
D. Lack of formal KRI approval from IT management
Answer: C
Question: 14
Reviewing which of the following would provide the GREATEST Input to the asset classification
process?
Answer: A
Question: 15
Which of the following is MOST likely to increase end user security awareness in an organization?
Answer: C
Question: 16
Answer: D
Question: 17
Page | 5
Answer: A
Question: 18
Which of the following is the MOST important influence to the continued success of an organization's
information security strategy?
A. Information systems
B. Security processes
C. Organizational culture
D. Policy development
Answer: C
Question: 19
Which of the following is the MOST important consideration for designing an effective information
security governance framework?
Answer: B
Question: 20
Answer: B
Page | 6
Thank You for trying CISM PDF Demo
https://www.testcollections.com/CISM.html
Page | 7