Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > Isaca > Isaca Certifications > CISM > CISM Online Practice Questions and Answers

CISM Online Practice Questions and Answers

Questions 4

Relationships among security technologies are BEST defined through which of the following?

A. Security metrics

B. Network topology

C. Security architecture

D. Process improvement models

Buy Now

Correct Answer: C

Security architecture explains the use and relationships of security mechanisms. Security metrics measure improvement within the security practice but do not explain the use and relationships of security technologies. Process improvement models and network topology diagrams also do not describe the use and relationships of these technologies.

Questions 5

A risk management program will be MOST effective when:

A. risk appetite is sustained for a long period

B. risk assessments are repeated periodically

C. risk assessments are conducted by a third party

D. business units are involved in risk assessments

Buy Now

Correct Answer: D

Questions 6

The MOST effective way to ensure that outsourced service providers comply with the organization's information security policy would be:

A. service level monitoring.

B. penetration testing.

C. periodically auditing.

D. security awareness training.

Buy Now

Correct Answer: C

Regular audit exercise can spot any gap in the information security compliance. Service level monitoring can only pinpoint operational issues in the organization's operational environment. Penetration testing can identify security vulnerability but cannot ensure information compliance Training can increase users' awareness on the information security policy, but is not more effective than auditing.

Questions 7

What is the MOST effective access control method to prevent users from sharing files with unauthorized users?

A. Mandatory

B. Discretionary

C. Walled garden

D. Role-based

Buy Now

Correct Answer: A

Mandatory access controls restrict access to files based on the security classification of the file. This prevents users from sharing files with unauthorized users. Role-based access controls grant access according to the role assigned to a user; they do not prohibit file sharing. Discretionary and lattice-based access controls are not as effective as mandatory access controls in preventing file sharing. A walled garden is an environment that controls a user's access to web content and services. In effect, the walled garden directs the user's navigation within particular areas, and does not necessarily prevent sharing of other material.

Questions 8

The PRIMARY purpose for continuous monitoring of security controls is to ensure:

A. system availability.

B. control gaps are minimized.

C. effectiveness of controls.

D. alignment with compliance requirements.

Buy Now

Correct Answer: C

Questions 9

Which of the following is the BEST indication of a mature information security program?

A. Security incidents are managed properly.

B. Security spending is below budget.

C. Security resources are optimized.

D. Security audit findings are reduced.

Buy Now

Correct Answer: C

A mature information security program is one that is aligned with the business strategy, objectives, and culture, and that delivers value to the organization by effectively managing the information security risks and enhancing the security posture. Optimizing the security resources means that the program uses the available human, financial, and technical resources in the most efficient and effective way, and that it continuously monitors and improves the performance and maturity of the security processes and controls. References: CISM Review Manual 2022, page 331; CISM ontent Outline, Domain 1, Knowledge Statement 1.22; What is a Mature Information Security Program?; How to Measure the Maturity of Your Cybersecurity Program

Questions 10

Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?

A. Place the web server in quarantine.

B. Rebuild the server from the last verified backup.

C. Shut down the server in an organized manner.

D. Rebuild the server with relevant patches from the original media.

Buy Now

Correct Answer: B

After a breach where the risk has been isolated and forensic processes have been performed, the next step should be to rebuild the server from the last verified backup. This will ensure that the server is restored to a known and secure state,

and that any malicious code or data that may have been injected or compromised by the attacker is removed. Rebuilding the server from the original media may not be sufficient, as it may not include the latest patches or configurations that

were applied before the breach. Placing the web server in quarantine or shutting it down may not be feasible or desirable, as it may disrupt the business operations or services that depend on the server. Rebuilding the server from the last

verified backup is the best option to resume normal operations while maintaining security.

References:

CISM Review Manual 15th Edition, page 118: "Recovery is the process of restoring normal operations after an incident. Recovery activities may include rebuilding systems, restoring data, applying patches, changing passwords, and testing

functionality." Data Breach Experts Share The Most Important Next Step You Should Take After A Data Breach in 2014 and 2015, snippet: "Restore from backup. If you have a backup of your system from before the breach, wipe your system

clean and restore from backup. This will ensure that any backdoors or malware installed by the hackers are removed."

Questions 11

Which of the following should have the MOST influence on an organization's response to a new industry regulation?

A. The organization's control objectives

B. The organization's risk management framework

C. The organization's risk appetite

D. The organization's risk control baselines

Buy Now

Correct Answer: C

The most influential factor on an organization's response to a new industry regulation is the organization's risk appetite. This is because the risk appetite defines the level of risk that the organization is willing to accept in pursuit of its objectives, and it guides the decision- making process for managing risks. The risk appetite also determines the extent to which the organization needs to comply with the new regulation, and the resources and actions required to achieve compliance. The risk appetite should be aligned with the organization's strategy, culture, and values, and it should be communicated and monitored throughout the organization.

Questions 12

Implementing the principle of least privilege PRIMARILY requires the identification of:

A. job duties

B. data owners

C. primary risk factors.

D. authentication controls

Buy Now

Correct Answer: A

Implementing the principle of least privilege primarily requires the identification of job duties. Job duties are the specific tasks and responsibilities that an individual performs as part of their role in the organization. By identifying the job duties, the organization can determine the minimum access privileges necessary for each individual to perform their assigned function, and nothing more. This helps to reduce the risk of unauthorized access, misuse, or compromise of information and resources. The principle of least privilege is a key security principle that states that every module (such as a user, a process, or a program) must be able to access only the information and resources that are necessary for its legitimate purpose. The other options are not the primary factors that require identification for implementing the principle of least privilege. Data owners are the individuals or entities that have the authority and responsibility to define the classification, usage, and protection of data. Data owners may be involved in granting or revoking access privileges to data, but they are not the ones who identify the job duties of the data users. Primary risk factors are the sources or causes of potential harm or loss to the organization. Primary risk factors may influence the level of access privileges granted to users, but they are not the ones who define the job duties of the users. Authentication controls are the mechanisms that verify the identity of users or systems before granting access to resources. Authentication controls may enforce the principle of least privilege, but they are not the ones who determine the job duties of the users.

Questions 13

Which of the following has the MOST influence on the inherent risk of an information asset?

A. Risk tolerance

B. Net present value (NPV)

C. Return on investment (ROI)

D. Business criticality

Buy Now

Correct Answer: D

Inherent risk is the risk that exists before any controls are applied. It is influenced by factors such as the nature, value, sensitivity, and exposure of the information asset. Business criticality is one of the most important factors affecting the inherent risk of an information asset, as it reflects how essential the asset is to the organization's operations and objectives. The higher the business criticality, the higher the inherent risk. Risk tolerance, NPV (Net Present Value), and ROI (Return on Investment) are not directly related to the inherent risk of an information asset, as they are more relevant to risk assessment and risk treatment processes.

Exam Code: CISM
Exam Name: Certified Information Security Manager
Last Update: Jun 06, 2025
Questions: 1983

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.