Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Certified Information Security Manager Question and Answers

Certified Information Security Manager

Last Update May 1, 2024
Total Questions : 674

We are offering FREE CISM Isaca exam questions. All you do is to just go and sign up. Give your details, prepare CISM free exam questions and then go for complete pool of Certified Information Security Manager test questions that will help you more.

CISM pdf

CISM PDF

$69.65  $199
CISM Engine

CISM Testing Engine

$78.75  $225
CISM PDF + Engine

CISM PDF + Testing Engine

$87.15  $249
Questions 1

An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?

Options:

A.  

Risk levels may be elevated beyond acceptable limits.

B.  

Security audits may report more high-risk findings.

C.  

The compensating controls may not be cost efficient.

D.  

Noncompliance with industry best practices may result.

Discussion 0
Questions 2

A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?

Options:

A.  

Prevent the user from using personal mobile devices.

B.  

Report the incident to the police.

C.  

Wipe the device remotely.

D.  

Remove user's access to corporate data.

Discussion 0
Questions 3

The PRIMARY objective of performing a post-incident review is to:

Options:

A.  

re-evaluate the impact of incidents.

B.  

identify vulnerabilities.

C.  

identify control improvements.

D.  

identify the root cause.

Discussion 0
Questions 4

Which of the following is the BEST indication that an organization has a mature information security culture?

Options:

A.  

Information security training is mandatory for all staff.

B.  

The organization's information security policy is documented and communicated.

C.  

The chief information security officer (CISO) regularly interacts with the board.

D.  

Staff consistently consider risk in making decisions.

Discussion 0
Questions 5

Which of the following is the BEST evidence of alignment between corporate and information security governance?

Options:

A.  

Security key performance indicators (KPIs)

B.  

Project resource optimization

C.  

Regular security policy reviews

D.  

Senior management sponsorship

Discussion 0
Questions 6

Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?

Options:

A.  

Patch management files

B.  

Network system logs

C.  

Configuration management files

D.  

Intrusion detection system (IDS) logs

Discussion 0
Questions 7

An online bank identifies a successful network attack in progress. The bank should FIRST:

Options:

A.  

isolate the affected network segment.

B.  

report the root cause to the board of directors.

C.  

assess whether personally identifiable information (Pll) is compromised.

D.  

shut down the entire network.

Discussion 0
Questions 8

Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?

Options:

A.  

Regulatory requirements

B.  

Compliance acceptance

C.  

Management support

D.  

Budgetary approval

Discussion 0
Questions 9

Prior to conducting a forensic examination, an information security manager should:

Options:

A.  

boot the original hard disk on a clean system.

B.  

create an image of the original data on new media.

C.  

duplicate data from the backup media.

D.  

shut down and relocate the server.

Discussion 0
Questions 10

Which of the following is MOST effective in monitoring an organization's existing risk?

Options:

A.  

Periodic updates to risk register

B.  

Risk management dashboards

C.  

Security information and event management (SIEM) systems

D.  

Vulnerability assessment results

Discussion 0
Questions 11

Which of the following is the BEST approach to make strategic information security decisions?

Options:

A.  

Establish regular information security status reporting.

B.  

Establish an information security steering committee.

C.  

Establish business unit security working groups.

D.  

Establish periodic senior management meetings.

Discussion 0
Questions 12

Which of the following should be given the HIGHEST priority during an information security post-incident review?

Options:

A.  

Documenting actions taken in sufficient detail

B.  

Updating key risk indicators (KRIs)

C.  

Evaluating the performance of incident response team members

D.  

Evaluating incident response effectiveness

Discussion 0
Questions 13

A balanced scorecard MOST effectively enables information security:

Options:

A.  

project management

B.  

governance.

C.  

performance.

D.  

risk management.

Discussion 0
Questions 14

Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?

Options:

A.  

Host patching

B.  

Penetration testing

C.  

Infrastructure hardening

D.  

Data classification

Discussion 0
Questions 15

Which of the following is the GREATEST benefit of information asset classification?

Options:

A.  

Helping to determine the recovery point objective (RPO)

B.  

Providing a basis for implementing a need-to-know policy

C.  

Supporting segregation of duties

D.  

Defining resource ownership

Discussion 0
Questions 16

Recovery time objectives (RTOs) are BEST determined by:

Options:

A.  

business managers

B.  

business continuity officers

C.  

executive management

D.  

database administrators (DBAs).

Discussion 0
Questions 17

Which of the following would BEST justify continued investment in an information security program?

Options:

A.  

Reduction in residual risk

B.  

Security framework alignment

C.  

Speed of implementation

D.  

Industry peer benchmarking

Discussion 0
Questions 18

An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?

Options:

A.  

The benefit is greater than the potential risk.

B.  

USB storage devices are enabled based on user roles.

C.  

Users accept the risk of noncompliance.

D.  

Access is restricted to read-only.

Discussion 0
Questions 19

To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:

Options:

A.  

rely on senior management to enforce security.

B.  

promote the relevance and contribution of security.

C.  

focus on compliance.

D.  

reiterate the necessity of security.

Discussion 0
Questions 20

Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?

Options:

A.  

Cost of the attack to the organization

B.  

Location of the attacker

C.  

Method of operation used by the attacker

D.  

Details from intrusion detection system (IDS) logs

Discussion 0
Questions 21

Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?

Options:

A.  

Alive demonstration of the third-party supplier's security capabilities

B.  

The ability to i third-party supplier's IT systems and processes

C.  

Third-party security control self-assessment (CSA) results

D.  

An independent review report indicating compliance with industry standards

Discussion 0
Questions 22

Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?

Options:

A.  

Provide employee training on secure mobile device practices

B.  

Implement a mobile device management (MDM) solution.

C.  

Require employees to install an effective anti-malware app.

D.  

Implement a mobile device policy and standard.

Discussion 0
Questions 23

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

Options:

A.  

Wipe and reset the endpoint device.

B.  

Isolate the endpoint device.

C.  

Power off the endpoint device.

D.  

Run a virus scan on the endpoint device.

Discussion 0
Questions 24

Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?

Options:

A.  

Communicate disciplinary processes for policy violations.

B.  

Require staff to participate in information security awareness training.

C.  

Require staff to sign confidentiality agreements.

D.  

Include information security responsibilities in job descriptions.

Discussion 0
Questions 25

The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:

Options:

A.  

cause fewer potential production issues.

B.  

require less IT staff preparation.

C.  

simulate real-world attacks.

D.  

identify more threats.

Discussion 0
Questions 26

Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?

Options:

A.  

Metrics to drive the information security program

B.  

Information security policies

C.  

A defined security organizational structure

D.  

An information security strategy

Discussion 0
Questions 27

Threat and vulnerability assessments are important PRIMARILY because they are:

Options:

A.  

used to establish security investments

B.  

the basis for setting control objectives.

C.  

elements of the organization's security posture.

D.  

needed to estimate risk.

Discussion 0
Questions 28

Who is BEST suited to determine how the information in a database should be classified?

Options:

A.  

Database analyst

B.  

Database administrator (DBA)

C.  

Information security analyst

D.  

Data owner

Discussion 0
Questions 29

When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?

Options:

A.  

External consultant

B.  

Information owners

C.  

Information security manager

D.  

Business continuity coordinator

Discussion 0
Questions 30

The effectiveness of an information security governance framework will BEST be enhanced if:

Options:

A.  

consultants review the information security governance framework.

B.  

a culture of legal and regulatory compliance is promoted by management.

C.  

risk management is built into operational and strategic activities.

D.  

IS auditors are empowered to evaluate governance activities

Discussion 0
Questions 31

An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?

Options:

A.  

Conduct user awareness training within the IT function.

B.  

Propose that IT update information security policies and procedures.

C.  

Determine the risk related to noncompliance with the policy.

D.  

Request that internal audit conduct a review of the policy development process,

Discussion 0
Questions 32

To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:

Options:

A.  

security metrics are included in the service level agreement (SLA).

B.  

contract clauses comply with the organization's information security policy.

C.  

the information security policy of the third-party service provider is reviewed.

D.  

right to audit is included in the service level agreement (SLA).

Discussion 0
Questions 33

A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?

Options:

A.  

Instruct the vendor to conduct penetration testing.

B.  

Suspend the connection to the application in the firewall

C.  

Report the situation to the business owner of the application.

D.  

Initiate the organization's incident response process.

Discussion 0
Questions 34

Labeling information according to its security classification:

Options:

A.  

enhances the likelihood of people handling information securely.

B.  

reduces the number and type of countermeasures required.

C.  

reduces the need to identify baseline controls for each classification.

D.  

affects the consequences if information is handled insecurely.

Discussion 0
Questions 35

In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:

Options:

A.  

change activities are documented.

B.  

the rationale for acceptance is periodically reviewed.

C.  

the acceptance is aligned with business strategy.

D.  

compliance with the risk acceptance framework.

Discussion 0
Questions 36

Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?

Options:

A.  

Establishing risk metrics

B.  

Training on risk management procedures

C.  

Reporting on documented deficiencies

D.  

Assigning a risk owner

Discussion 0
Questions 37

In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?

Options:

A.  

Revise the policy.

B.  

Perform a root cause analysis.

C.  

Conduct a risk assessment,

D.  

Communicate the acceptable use policy.

Discussion 0
Questions 38

When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?

Options:

A.  

The information security strategy

B.  

Losses due to security incidents

C.  

The results of a risk assessment

D.  

Security investment trends in the industry

Discussion 0
Questions 39

An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?

Options:

A.  

The information security manager

B.  

The data owner

C.  

The application owner

D.  

The security engineer

Discussion 0
Questions 40

An organization's quality process can BEST support security management by providing:

Options:

A.  

security configuration controls.

B.  

assurance that security requirements are met.

C.  

guidance for security strategy.

D.  

a repository for security systems documentation.

Discussion 0
Questions 41

Which of the following is the MOST important consideration when establishing an organization's information security governance committee?

Options:

A.  

Members have knowledge of information security controls.

B.  

Members are business risk owners.

C.  

Members are rotated periodically.

D.  

Members represent functions across the organization.

Discussion 0
Questions 42

Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?

Options:

A.  

Security policy

B.  

Risk management framework

C.  

Risk appetite

D.  

Security standards

Discussion 0
Questions 43

Which of the following should be the PRIMARY consideration when developing an incident response plan?

Options:

A.  

The definition of an incident

B.  

Compliance with regulations

C.  

Management support

D.  

Previously reported incidents

Discussion 0
Questions 44

Which of the following is the PRIMARY role of an information security manager in a software development project?

Options:

A.  

To enhance awareness for secure software design

B.  

To assess and approve the security application architecture

C.  

To identify noncompliance in the early design stage

D.  

To identify software security weaknesses

Discussion 0
Questions 45

Which of the following BEST supports the incident management process for attacks on an organization's supply chain?

Options:

A.  

Including service level agreements (SLAs) in vendor contracts

B.  

Establishing communication paths with vendors

C.  

Requiring security awareness training for vendor staff

D.  

Performing integration testing with vendor systems

Discussion 0
Questions 46

Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?

Options:

A.  

Follow the escalation process.

B.  

Identify the indicators of compromise.

C.  

Notify law enforcement.

D.  

Contact forensic investigators.

Discussion 0
Questions 47

Which of the following is the BEST indication of effective information security governance?

Options:

A.  

Information security is considered the responsibility of the entire information security team.

B.  

Information security controls are assigned to risk owners.

C.  

Information security is integrated into corporate governance.

D.  

Information security governance is based on an external security framework.

Discussion 0
Questions 48

The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?

Options:

A.  

Inform senior management

B.  

Re-evaluate the risk

C.  

Implement compensating controls

D.  

Ask the business owner for the new remediation plan

Discussion 0