CISM SET 7 Practice Questions with Correct Answers
601. Which of the following information security activities is MOST helpful to
support compliance with information security policy?
A. Conducting information security awareness programs
B. Creating monthly trend metrics
C. Performing periodic IT reviews on new system acquisitions
D. Obtaining management commitment - Answer✔️✔️-D. Obtaining management
commitment
602. Which of the following is MOST important to determine following the
discovery and eradication of a malware attack?
A. The creator of the malware
B. The malware entry path
C. The type of malware involved
D. The method of detecting the malware - Answer✔️✔️-B. The malware entry path
603. Which of the following is MOST helpful in ensuring an information security
governance framework continues to support business objectives?
1
,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
A. A consistent risk assessment methodology
B. A monitoring strategy
C. An effective organizational structure
D. Stakeholder buy-in - Answer✔️✔️-D. Stakeholder buy-in
604. Reviewing which of the following would be MOST helpful when a new
information security manager is developing an information security strategy for a
non-regulated organization?
A. Managements business goals and objectives
B. Strategies of other non-regulated companies
C. Industry best practices and control recommendations
D. Risk assessment results - Answer✔️✔️-D. Risk assessment results
605. In order to understand an organization's security posture, it is MOST
important for an organization's senior leadership to:
A. review the number of reported security incidents.
B. evaluate results of the most recent incident response test.
C. ensure established security metrics are reported.
2
,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
D. assess progress of risk mitigation efforts. - Answer✔️✔️-C. ensure established
security metrics are reported
606. Information security controls should be designed PRIMARILY based on:
A. regulatory requirements.
B. a vulnerability assessment.
C. business risk scenarios.
D. a business impact analysis (BIA). - Answer✔️✔️-C. business risk scenarios
607. An organization involved in e-commerce activities operating from its home
country opened a new office in another country with stringent security laws. In this
scenario, the overall security strategy should be based on:
A. risk assessment results.
B. international security standards.
C. the most stringent requirements.
D. the security organization structure. - Answer✔️✔️-C. the most stringent
requirements
608. An information security manager developing an incident response plan MUST
ensure it includes:
3
, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
A. critical infrastructure diagrams.
B. a business impact analysis (BIA).
C. criteria for escalation.
D. an inventory of critical data. - Answer✔️✔️-C. criteria for escalation
609. Which of the following is the MOST effective way to help staff members
understand their responsibilities for information security?
A. Require staff to sign confidentiality agreements.
B. Require staff to participate in information security awareness training.
C. Communicate disciplinary processes for policy violations.
D. Include information security responsibilities in job descriptions. - Answer✔️✔️-
B. Require staff to participate in information security awareness training
610. Security program development is PRIMARILY driven by which of the
following?
A. Regulatory requirements
B. Business strategy
C. Risk appetite
D. Available resources - Answer✔️✔️-B. Business strategy
4