Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CISM Isaca Certified Information Security Manager Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Isaca CISM Certified Information Security Manager certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 8
Total 954 questions

Which of the following BEST indicates that information security governance and corporate governance are integrated?

A.

The information security team is aware of business goals.

B.

The board is regularly informed of information security key performance indicators (KPIs),

C.

The information security steering committee is composed of business leaders.

D.

A cost-benefit analysis is conducted on all information security initiatives.

Which of the following metrics would provide an accurate measure of an information security program's performance?

A.

A collection of qualitative indicators that accurately measure security exceptions

B.

A combination of qualitative and quantitative trends that enable decision making

C.

A collection of quantitative indicators that are compared against industry benchmarks

D.

A single numeric score derived from various measures assigned to the security program

Which of the following has the MOST influence on the inherent risk of an information asset?

A.

Risk tolerance

B.

Net present value (NPV)

C.

Return on investment (ROI)

D.

Business criticality

Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?

A.

To identify the organization's risk tolerance

B.

To improve security processes

C.

To align security roles and responsibilities

D.

To optimize security risk management

During which phase of an incident response plan is the root cause determined?

A.

Recovery

B.

Lessons learned

C.

Containment

D.

Eradication

Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?

A.

Increase the frequency of system backups.

B.

Review the mitigating security controls.

C.

Notify staff members of the threat.

D.

Assess the risk to the organization.

Which of the following should be the NEXT step after a security incident has been reported?

A.

Recovery

B.

Investigation

C.

Escalation

D.

Containment

A security incident has been reported within an organization. When should an information security manager contact the information owner?

A.

After the incident has been contained

B.

After the incident has been mitigated

C.

After the incident has been confirmed

D.

After the potential incident has been logged

Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?

A.

Force password changes on the SQL database.

B.

Reconfigure the web application firewall to block the attack.

C.

Update the detection patterns on the web application firewall.

D.

Block the IPs from where the attack originates.

Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?

A.

Data owner

B.

Business owner

C.

Information security manager

D.

Compliance manager

A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?

A.

The time and location that the breach occurred

B.

Evidence of previous incidents caused by the user

C.

The underlying reason for the user error

D.

Appropriate disciplinary procedures for user error

The PRIMARY objective of timely declaration of a disaster is to:

A.

ensure engagement of business management in the recovery process.

B.

assess and correct disaster recovery process deficiencies.

C.

protect critical physical assets from further loss.

D.

ensure the continuity of the organization's essential services.

Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?

A.

Ability to monitor and control incident management costs

B.

More visibility to the impact of disruptions

C.

Effective protection of information assets

D.

Optimized allocation of recovery resources

Which of the following is the MOST important reason for obtaining input from risk owners when implementing controls?

A.

To reduce risk mitigation costs

B.

To resolve vulnerabilities in enterprise architecture (EA)

C.

To manage the risk to an acceptable level

D.

To eliminate threats impacting the business

A PRIMARY benefit of adopting an information security framework is that it provides:

A.

credible emerging threat intelligence.

B.

security and vulnerability reporting guidelines.

C.

common exploitability indices.

D.

standardized security controls.

An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.

Which of the following should be given immediate focus?

A.

Moving to a zero trust access model

B.

Enabling network-level authentication

C.

Enhancing cyber response capability

D.

Strengthening endpoint security

Which of the following is the MOST important issue in a penetration test?

A.

Having an independent group perform the test

B.

Obtaining permission from audit

C.

Performing the test without the benefit of any insider knowledge

D.

Having a defined goal as well as success and failure criteria

Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?

A.

Align the standards with the organizational policy.

B.

Align the standards with industry best practices.

C.

Resolve the discrepancy before developing the standards.

D.

Perform a cost-benefit analysis of aligning the standards to policy.

Which of the following would be MOST useful when determining the business continuity strategy for a large organization's data center?

A.

Stakeholder feedback analysis

B.

Business continuity risk analysis

C.

Incident root cause analysis

D.

Business impact analysis (BIA)

Which of the following is the MOST important factor in successfully implementing Zero Trust?

A.

Preferring networks that have undergone penetration testing

B.

Focusing on logging and monitoring of user behavior

C.

Authenticating and authorizing strategic points of the architecture

D.

Understanding each component of the network

Which of the following should be the MOST important consideration when establishing information security policies for an organization?

A.

Job descriptions include requirements to read security policies.

B.

The policies are updated annually.

C.

Senior management supports the policies.

D.

The policies are aligned to industry best practices.

An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?

A.

Immediately suspend the executives' access privileges.

B.

Notify the CISO of the security policy violation.

C.

Perform a full review of all system transactions over the past 90 days.

D.

Perform a system access review.

Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?

A.

To alert on unacceptable risk

B.

To identify residual risk

C.

To reassess risk appetite

D.

To benchmark control performance

Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?

A.

Conduct a business impact analysis (BIA)

B.

Identify the response and recovery learns.

C.

Review the communications plan.

D.

Develop response and recovery strategies.

An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?

A.

Red team exercise

B.

Black box penetration test

C.

Disaster recovery exercise

D.

Tabletop exercise

Which of the following is MOST important to include in an information security status report management?

A.

List of recent security events

B.

Key risk indication (KRIs)

C.

Review of information security policies

D.

information security budget requests

Which of the following is the BEST defense against a brute force attack?

A.

Time-of-day restrictions

B.

Mandatory access control

C.

Discretionary access control

D.

Multi-factor authentication (MFA)

To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?

A.

Request the service provider comply with information security policy.

B.

Review a recent independent audit report of the service provider.

C.

Assess the level of security awareness of the service provider.

D.

Review samples of service level reports from the service provider.

In a call center, the BEST reason to conduct a social engineering is to:

A.

Identify candidates for additional security training.

B.

minimize the likelihood of successful attacks.

C.

gain funding for information security initiatives.

D.

improve password policy.

Which of the following is the BEST indicator of an organization's information security status?

A.

Intrusion detection log analysis

B.

Controls audit

C.

Threat analysis

D.

Penetration test

Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?

A.

Alignment with financial reporting

B.

Alignment with business initiatives

C.

Alignment with industry frameworks

D.

Alignment with risk appetite

An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?

A.

Scan the entire application using a vulnerability scanning tool.

B.

Run the application from a high-privileged account on a test system.

C.

Perform security code reviews on the entire application.

D.

Monitor Internet traffic for sensitive information leakage.

Which of the following business units should own the data that populates an identity management system?

A.

Human resources (HR)

B.

Legal

C.

Information technology

D.

Information security

Which of the following sources is MOST useful when planning a business-aligned information security program?

A.

Security risk register

B.

Information security policy

C.

Business impact analysis (BIA)

D.

Enterprise architecture (EA)

Which of the following is the PRIMARY purpose of a business impact analysis (BIA)?

A.

To define security roles and responsibilities

B.

To determine return on investment (ROI)

C.

To establish incident severity levels

D.

To determine the criticality of information assets

Which of the following is the BEST source of information to support an organization's information security vision and strategy?

A.

Metrics dashboard

B.

Governance policies

C.

Capability maturity model

D.

Enterprise information security architecture

Which of the following BEST facilitates the effectiveness of cybersecurity incident response?

A.

Utilizing a security information and event management (SIEM) tool.

B.

Utilizing industry-leading network penetration testing tools.

C.

Increasing communication with all incident response stakeholders.

D.

Continuously updating signatures of the anti-malware solution.

An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?

A.

Install the OS, patches, and application from the original source.

B.

Restore the OS, patches, and application from a backup.

C.

Restore the application and data from a forensic copy.

D.

Remove all signs of the intrusion from the OS and application.

An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?

A.

Assess business impact against security risk.

B.

Provide security awareness training to customers.

C.

Refer to industry best practices.

D.

Quantify the security risk to the business.

In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or

A.

Security budget

B.

Risk register

C.

Risk score

D.

Laws and regulations

Page: 2 / 8
Total 954 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved