CISM All Domain Questions with 100% Correct Answers
An information security strategy document that includes specific links to an
organization's business activities is PRIMARILY an indicator of - Answer✔️✔️-
alignment
The PRIMARY focus on information security governance is to: - Answer✔️✔️-
optimize the information security strategy to achieve business objectives
Senior management commitment and support for information security can BEST
be enhanced through: - Answer✔️✔️-periodic review of alignment with business
management goals.
Which of the following is the MOST important element to consider when initiating
asset classification? - Answer✔️✔️-the consequences of losing system functionality
The information classification scheme should: - Answer✔️✔️-consider possible
impact of a security breach
After a risk assessment study, a bank with global operations decided to continue
doing business in certain regions of the world where identity theft is rampant. The
information security manager should encourage the business to: - Answer✔️✔️-
implement monitoring techniques to detect and react to potential fraud
1
,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
A security awareness program should: - Answer✔️✔️-address specific groups and
roles
PRIMARY objective of conducting information security awareness training for all
users is to: - Answer✔️✔️-build a common understanding of information security
Which of the following areas is MOST susceptible to the introduction of security
weaknesses? - Answer✔️✔️-configuration management
Which of the following is the MOST appropriate individual to ensure that new
exposures have not been introduced into an existing application during the change
management process? - Answer✔️✔️-system user
When selecting a public cloud vendor to provide outsourced infrastructure and
software, an organization's information security manager should: - Answer✔️✔️-
verify that the vendor's security architecture meets the organization's requirements
The FIRST priority when responding to a major security incident is: - Answer✔️✔️-
containment
When designing the technical solution for a disaster recovery site, the PRIMARY
factor that should be taken into consideration is the: - Answer✔️✔️-recovery
window
2
,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
Alignment of a security program to business objectives is BEST achieved through:
- Answer✔️✔️-a security steering committee with representatives from all business
functions.
The MOST effective way to limit actual and potential impacts of e-discovery in the
event of litigation is to: - Answer✔️✔️-develop and enforce comprehensive retention
policies
Which of the following BEST supports continuous improvement of the risk
management process? - Answer✔️✔️-adoption of a maturity model
Which of the following is the MOST important factor on which to rely to
successfully assign cross-organizational - Answer✔️✔️-
responsibility to integrate an information security program? - Answer✔️✔️-the roles
of different job functions
Which of the following BEST protects confidentiality of information? -
Answer✔️✔️-least privilege
Quantitative risk analysis is MOST appropriate when assessment data: -
Answer✔️✔️-contain percentage estimates
3
, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
Which of the following is involved when conducting a business impact analysis
(BIA)? - Answer✔️✔️-listing critical business resources
After completing a full IT risk assessment, who will BEST decide which
mitigating controls should be implemented? (**) - Answer✔️✔️-business manager
One way to determine control effectiveness is by determining: - Answer✔️✔️-the
test results of intended objectives
Which of the following BEST describes the key objective of an information
security program? - Answer✔️✔️-protect information assets using manual and
automated controls
What is the MOST cost-effective method of identifying new vendor
vulnerabilities? - Answer✔️✔️-external vulnerability reporting sources
The decision on whether new risks should fall under periodic or event-driven
reporting should be based on which of the following - Answer✔️✔️-visibility of
impact
Which of the following ensures that newly identified security weaknesses in an
operating system are mitigated in a timely fashion? - Answer✔️✔️-patch
management
4