CISM Isaca Certified Information Security Manager Free Practice Exam Questions (2025 Updated)
Prepare effectively for your Isaca CISM Certified Information Security Manager certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.
Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?
Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?
Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?
Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?
An incident response policy should include:
Which of the following BEST enables the integration of information security governance into corporate governance?
Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?
A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?
Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?
An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?
An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?
Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?
Which of the following is the BEST way to obtain organization-wide support for an information security program?
After logging in to a web application, additional authentication is checked at various application points. Which of the following is the PRIMARY reason for such an approach?
Which of the following change management procedures is MOST likely to cause concern to the information security manager?
Threat and vulnerability assessments are important PRIMARILY because they are:
Which of the following should be the PRIMARY area of focus when mitigating security risks associated with emerging technologies?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
Which of the following is the BEST course of action when using a web application that has known vulnerabilities?
Which of the following is the MOST important role of the information security manager when the organization is in the process of adopting emerging technologies?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
The PRIMARY objective of performing a post-incident review is to:
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?
Which of the following is MOST helpful to identify whether information security policies have been followed?
Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:
An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?
An information security policy was amended recently to support an organization's new information security strategy. Which of the following should be the information security manager's NEXT step?
To ensure that a new application complies with information security policy, the BEST approach is to:
An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?
Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?
Which type of recovery site is MOST reliable and can support stringent recovery requirements?
Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
What type of control is being implemented when a security information and event management (SIEM) system is installed?
Which of the following BEST enables an incident response team to determine appropriate actions during an initial investigation?
Which of the following will result in the MOST accurate controls assessment?
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:
When developing an asset classification program, which of the following steps should be completed FIRST?