Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CISM Isaca Certified Information Security Manager Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Isaca CISM Certified Information Security Manager certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 6 / 8
Total 954 questions

Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?

A.

Capability maturity model

B.

Vulnerability assessment

C.

IT security risk and exposure

D.

Business impact analysis (BIA)

Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?

A.

Review the previous risk assessment and countermeasures.

B.

Perform a new risk assessment,

C.

Evaluate countermeasures to mitigate new risks.

D.

Transfer the new risk to a third party.

Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?

A.

Legal and regulatory requirements

B.

Likelihood of a disaster

C.

Organizational tolerance to service interruption

D.

Geographical location of the backup site

Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?

A.

Disaster recovery plan (DRP)

B.

Incident notification plan

C.

Risk response scenarios

D.

Security procedures

An incident response policy should include:

A.

A description of testing methodology.

B.

Notification requirements.

C.

An infrastructure diagram.

D.

Recovery time objectives (RTOs).

Which of the following BEST enables the integration of information security governance into corporate governance?

A.

Well-decumented information security policies and standards

B.

An information security steering committee with business representation

C.

Clear lines of authority across the organization

D.

Senior management approval of the information security strategy

Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?

A.

Requiring challenge/response information

B.

Requiring multi factor authentication

C.

Enforcing frequent password changes

D.

Enforcing complex password formats

A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?

A.

Instruct the vendor to conduct penetration testing.

B.

Suspend the connection to the application in the firewall

C.

Report the situation to the business owner of the application.

D.

Initiate the organization's incident response process.

Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?

A.

Define policies and standards for data processing.

B.

Implement applicable privacy principles

C.

Assess local or regional regulations

D.

Research cyber insurance policies

An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?

A.

No owners were identified for some risks.

B.

Business applications had the highest number of risks.

C.

Risk mitigation action plans had no timelines.

D.

Risk mitigation action plan milestones were delayed.

An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?

A.

Determine which country's information security regulations will be used.

B.

Merge the two existing information security programs.

C.

Apply the existing information security program to the acquired company.

D.

Evaluate the information security laws that apply to the acquired company.

Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?

A.

Execute a risk treatment plan.

B.

Review contracts and statements of work (SOWs) with vendors.

C.

Implement data regionalization controls.

D.

Determine current and desired state of controls.

Which of the following is the BEST way to obtain organization-wide support for an information security program?

A.

Mandate regular security awareness training.

B.

Develop security performance metrics.

C.

Position security as a business enabler.

D.

Prioritize security initiatives based on IT strategy.

After logging in to a web application, additional authentication is checked at various application points. Which of the following is the PRIMARY reason for such an approach?

A.

To ensure access rights meet classification requirements

B.

To facilitate the analysis of application logs

C.

To ensure web application availability

D.

To support strong two-factor authentication protocols

Which of the following change management procedures is MOST likely to cause concern to the information security manager?

A.

Fallback processes are tested the weekend before changes are made

B.

Users are not notified of scheduled system changes

C.

A manual rather than an automated process is used to compare program versions.

D.

The development manager migrates programs into production

Threat and vulnerability assessments are important PRIMARILY because they are:

A.

used to establish security investments

B.

the basis for setting control objectives.

C.

elements of the organization's security posture.

D.

needed to estimate risk.

Which of the following should be the PRIMARY area of focus when mitigating security risks associated with emerging technologies?

A.

Compatibility with legacy systems

B.

Application of corporate hardening standards

C.

Integration with existing access controls

D.

Unknown vulnerabilities

The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:

A.

)the information security officer.

B.

the steering committee.

C.

the board of directors.

D.

the internal audit manager.

Which of the following is the BEST course of action when using a web application that has known vulnerabilities?

A.

Monitor application level logs.

B.

Deploy host-based intrusion detection.

C.

Deploy an application firewall.

D.

Install anti-spyware software.

Which of the following is the MOST important role of the information security manager when the organization is in the process of adopting emerging technologies?

A.

Assessing how peer organizations using the same technologies have been impacted

B.

Understanding the impact on existing resources

C.

Reviewing vendor contracts and service level agreements (SLAs)

D.

Developing training for end users to familiarize them with the new technology

Which of the following will ensure confidentiality of content when accessing an email system over the Internet?

A.

Multi-factor authentication

B.

Digital encryption

C.

Data masking

D.

Digital signatures

The PRIMARY objective of performing a post-incident review is to:

A.

re-evaluate the impact of incidents.

B.

identify vulnerabilities.

C.

identify control improvements.

D.

identify the root cause.

An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?

A.

Recovery time objective (RTO)

B.

Recovery point objective (RPO)

C.

Maximum tolerable downtime (MTD)

D.

Service level agreement (SLA)

Which of the following is MOST helpful to identify whether information security policies have been followed?

A.

Preventive controls

B.

Detective controls

C.

Directive controls

D.

Corrective controls

Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:

A.

a function of the likelihood and impact, should a threat exploit a vulnerability.

B.

the magnitude of the impact, should a threat exploit a vulnerability.

C.

a function of the cost and effectiveness of controls over a vulnerability.

D.

the likelihood of a given threat attempting to exploit a vulnerability

An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?

A.

Operations manager

B.

Service owner

C.

Information security manager

D.

Incident response team

An information security policy was amended recently to support an organization's new information security strategy. Which of the following should be the information security manager's NEXT step?

A.

Evaluate the alignment with business strategy.

B.

Review technical controls.

C.

Update standards and procedures.

D.

Refresh the security training program.

To ensure that a new application complies with information security policy, the BEST approach is to:

A.

review the security of the application before implementation.

B.

integrate functionality the development stage.

C.

perform a vulnerability analysis.

D.

periodically audit the security of the application.

An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?

A.

Provide additional training to the incident response team.

B.

Review the incident management procedures.

C.

Interview the incident response team.

D.

Remove the steps from the incident management procedures.

Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?

A.

Collect additional metrics.

B.

Perform a cost-benefit analysis.

C.

Submit funding request to senior management.

D.

Begin due diligence on the outsourcing company.

Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?

A.

Documentation of control procedures

B.

Standardization of compliance requirements

C.

Automation of controls

D.

Integration of assurance efforts

Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?

A.

Information security program metrics

B.

Results of a recent external audit

C.

The information security operations matrix

D.

Changes to information security risks

Which type of recovery site is MOST reliable and can support stringent recovery requirements?

A.

Cold site

B.

Warm site

C.

Hot site

D.

Mobile site

Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?

A.

Ensuring the continued resilience and security of IT services

B.

Decreasing the percentage of security deployments that cause failures in production

C.

Reducing the number of control assessments to optimize resources

D.

Identifying and addressing security team performance issues

During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:

A.

baseline security controls.

B.

benchmarking security metrics.

C.

security objectives.

D.

cost-benefit analyses.

What type of control is being implemented when a security information and event management (SIEM) system is installed?

A.

Preventive

B.

Deterrent

C.

Detective

D.

Corrective

Which of the following BEST enables an incident response team to determine appropriate actions during an initial investigation?

A.

Feedback from affected departments

B.

Historical data from past incidents

C.

Technical capabilities of the team

D.

Procedures for incident triage

Which of the following will result in the MOST accurate controls assessment?

A.

Mature change management processes

B.

Senior management support

C.

Well-defined security policies

D.

Unannounced testing

An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:

A.

service level agreements (SLAs)

B.

security requirements for the process being outsourced.

C.

risk-reporting methodologies.

D.

security metrics

When developing an asset classification program, which of the following steps should be completed FIRST?

A.

Categorize each asset.

B.

Create an inventory. &

C.

Create a business case for a digital rights management tool.

D.

Implement a data loss prevention (OLP) system.

Page: 6 / 8
Total 954 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved