100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CISM TEST EXAM QUESTIONS AND ANSWERS (VERIFIED ANSWERS GRADED A+) LATEST UPDATE 2025/2026

Rating
-
Sold
-
Pages
44
Grade
A+
Uploaded on
19-07-2025
Written in
2024/2025

CISM TEST EXAM QUESTIONS AND ANSWERS (VERIFIED ANSWERS GRADED A+) LATEST UPDATE 2025/2026

Institution
CISM
Course
CISM











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISM
Course
CISM

Document information

Uploaded on
July 19, 2025
Number of pages
44
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CISM TEST EXAM QUESTIONS AND ANSWERS (VERIFIED ANSWERS
CISM practice test
GRADED A+) LATEST UPDATE 2025/2026
Study online at https://quizlet.com/_c3o1nx

1. An information security manager wants to improve C
the ability to identify changes in risk levels affecting
the organization's systems. Which of the following is
the BEST method to achieve this objective?
A. Performing business impact analysis (BIA)
B. Monitoring key goal indicators (KGIs)
C. Monitoring key risk indicators (KRIs)
D. Updating the risk register

2. When developing an escalation process for an inci- A
dent response plan, the information security manager
should PRIMARILY consider the:
A. Affected stakeholders
B. Incident response team
C. Availability of technical resources
D. Media coverage

3. Which of the following should be an information se- A
curity managers MOST important consideration when
determining if an information asset has been classi-
fied appropriately?
A. Value to the business
B. Security policy requirements
C. Ownership of information
D. Level of protection

4. The effectiveness of an incident response team will be A
GREATEST when:
A. The incident response process is updated based on
lessons learned
B. The incident response team members are trained
security personnel


, CISM practice test
Study online at https://quizlet.com/_c3o1nx

C. The incident response team meets on a regular
basis to review log files
D. Incidents are identified using a security information
and event monitoring (SIEM) system

5. An information security manager MUST have an un- D
derstanding of the organizational business goals to:
A. Relate information security to change manage-
ment
B. Develop an information security strategy
C. Develop operational procedures
D. Define key performance indicators (KPIs)

6. An information security manager MUST have an un- D
derstanding of an information security program?
A. Understanding current and emerging technologies
B. Establishing key performance indicators (KPIs)
C. Conducting periodic risk assessments
D. Obtaining stakeholder input

7. An attacker was able to gain access to an organiza- C
tional perimeter firewall and made changes to allow
wider external access and to steal data. Which of the
following would have BEST provided timely identifica-
tion of this incident?
A. Implementing a data loss prevention (DLP) suite
B. Deploying an intrusion prevention system (IPS)
C. Deploying a security information and event manag-
ing system (SIEM)
D. Conducting regular system administrator aware-
ness training

8. D


, CISM practice test
Study online at https://quizlet.com/_c3o1nx

When establishing metrics for an information security
program, the BEST approach is to identify indicators
that:
A. Support major information security initiatives
B. Reflect the corporate risk culture
C. Reduce information security spending
D. Demonstrate the effectiveness of the security pro-
gram

9. For an organization that provides web-based services, A
which of the following security events would MOST
likely initiate an incident response plan and be esca-
lated to management?
A. Anti-malware alerts on several employees worksta-
tions
B. Several port scans of web server
C. Multiple failed login attempts on an employee's
workstation
D. Suspicious network traffic originating from the de-
militarized zone (DMZ)

10. An information security manager is implementing a C
bring your own device (BYOD) program. Which of the
following would BEST ensure that users adhere to the
security standards?
A. Publish the standards on the internet page
B. Deploy a device management solution
C. Establish an acceptable use poly
D. Monitor user activities on the network

11. When monitoring the security of a web-based appli- B
cation, which of the following is MOST frequently re-



, CISM practice test
Study online at https://quizlet.com/_c3o1nx

viewed.
A. Audit reports
B. Access logs
C. Access lists
D. Threat metrics

12. Which of the following is the MOST effective way for an D
information security manager to ensure that security
is incorporated into an organization's project develop-
ment processes
A. Develop good communications with the project
management office (PMO)
B. Participate in project initiation, and funding
C. Conduct security reviews during design, testing,
and implementation
D. Integrate organizational security requirements into
project management

13. Which of the following provides the MOST relevant D
information to determine the overall effectiveness of
en information security program and underlying busi-
ness processes?
A. SWOT analysis
B. Industry benchmarks
C. Cost-benefit analysis
D. Balanced scorecard

14. An organization finds unauthorized software has D
been installed on a number of workstations. The soft-
ware was found to contain a Trojan, which had been
uploading data to an unknown external party. Which
of the following would have BEST prevented the instal-
Free
Get access to the full document:
Download

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Daratoo

Get to know the seller

Seller avatar
Daratoo Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
243
Member since
7 months
Number of followers
0
Documents
1996
Last sold
3 hours ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions