Certbus > Isaca > Isaca Certifications > CISM > CISM Online Practice Questions and Answers

CISM Online Practice Questions and Answers

Questions 4

Based on the information provided, which of the following situations presents the GREATEST information security risk for an organization with multiple, but small, domestic processing locations?

A. Systems operation procedures are not enforced

B. Change management procedures are poor

C. Systems development is outsourced

D. Systems capacity management is not performed

Browse 1983 Q&As
Questions 5

Information security policies should:

A. address corporate network vulnerabilities.

B. address the process for communicating a violation.

C. be straightforward and easy to understand.

D. be customized to specific groups and roles.

Browse 1983 Q&As
Questions 6

To mitigate a situation where one of the programmers of an application requires access to production data, the information security manager could BEST recommend to.

A. create a separate account for the programmer as a power user.

B. log all of the programmers' activity for review by supervisor.

C. have the programmer sign a letter accepting full responsibility.

D. perform regular audits of the application.

Browse 1983 Q&As
Questions 7

An effective way of protecting applications against Structured Query Language (SQL) injection vulnerability is to:

A. validate and sanitize client side inputs.

B. harden the database listener component.

C. normalize the database schema to the third normal form.

D. ensure that the security patches are updated on operating systems.

Browse 1983 Q&As
Questions 8

Which of the following would be MOST helpful when justifying the funding required for a compensating control?

A. Business case

B. Risk analysis

C. Business impact analysis

D. Threat assessment

Browse 1983 Q&As
Questions 9

When analyzing the emerging risk and threat landscape, an information security manager should FIRST:

A. determine the impact if threats materialize.

B. determine the sources of emerging threats.

C. review historical threats within the industry.

D. map threats to business assets.

Browse 1983 Q&As
Questions 10

Which of the following BEST helps to enable the desired information security culture within an organization?

A. Information security awareness training and campaigns

B. Effective information security policies and procedures

C. Delegation of information security roles and responsibilities

D. Incentives for appropriate information security-related behavior

Browse 1983 Q&As
Questions 11

Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?

A. Record and close security incident tickets.

B. Test and verify that compromised systems are clean.

C. Document recovery steps for senior management reporting.

D. Capture and preserve forensic images of affected systems.

Browse 1983 Q&As
Questions 12

Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?

A. The organization's risk tolerance

B. The organization's mission

C. Resource availability

D. Incident response team training

Browse 1983 Q&As
Questions 13

Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?

A. To ensure separation of duties is maintained

B. To ensure system audit trails are not bypassed

C. To prevent accountability issues

D. To prevent unauthorized user access

Browse 1983 Q&As
Questions 14

An organization has acquired a company in a foreign country to gain an advantage in a new market.

Which of the following is the FIRST step the information security manager should take?

A. Determine which country's information security regulations will be used.

B. Merge the two existing information security programs.

C. Apply the existing information security program to the acquired company.

D. Evaluate the information security laws that apply to the acquired company.

Browse 1983 Q&As
Questions 15

A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?

A. Instruct the vendor to conduct penetration testing.

B. Suspend the connection to the application in the firewall.

C. Report the situation to the business owner of the application.

D. Initiate the organization's incident response process.

Browse 1983 Q&As
Questions 16

Which of the following is the BEST approach for governing noncompliance with security requirements?

A. Base mandatory review and exception approvals on residual risk.

B. Require users to acknowledge the acceptable use policy.

C. Require the steering committee to review exception requests.

D. Base mandatory review and exception approvals on inherent risk.

Browse 1983 Q&As
Questions 17

A recovery point objective (RPO) is required in which of the following?

A. Disaster recovery plan (DRP)

B. Information security plan

C. Incident response plan

D. Business continuity plan (BCP)

Browse 1983 Q&As
Questions 18

Which of the following roles is BEST able to influence the security culture within an organization?

A. Chief information security officer (CISO)

B. Chief information officer (CIO)

C. Chief executive officer (CEO)

D. Chief operating officer (COO)

Browse 1983 Q&As
Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Mar 14, 2025
Questions: 1983 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99