100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CERTIFIED INFORMATION SECURITY MANAGER (CISM) QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) PLUS RATIONALES 2026 Q&A | INSTANT DOWNLOAD PDF

Rating
-
Sold
-
Pages
22
Grade
A+
Uploaded on
13-12-2025
Written in
2025/2026

CERTIFIED INFORMATION SECURITY MANAGER (CISM) QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) PLUS RATIONALES 2026 Q&A | INSTANT DOWNLOAD PDF

Institution
CERTIFIED INFORMATION SECURITY MANAGER
Course
CERTIFIED INFORMATION SECURITY MANAGER










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CERTIFIED INFORMATION SECURITY MANAGER
Course
CERTIFIED INFORMATION SECURITY MANAGER

Document information

Uploaded on
December 13, 2025
Number of pages
22
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CERTIFIED INFORMATION SECURITY
MANAGER (CISM) QUESTIONS AND
CORRECT ANSWERS (VERIFIED
ANSWERS) PLUS RATIONALES 2026 Q&A
| INSTANT DOWNLOAD PDF

1. Which activity is the primary responsibility of information security
governance?
A. Implementing firewalls
B. Managing daily security operations
C. Ensuring information security strategy aligns with business objectives
D. Performing vulnerability scans
Rationale: Governance focuses on strategic alignment, value delivery, and
oversight rather than technical execution.
2. What is the MOST important factor when establishing an information
security program?
A. Available security tools
B. Regulatory requirements
C. Business objectives and risk appetite
D. Industry benchmarks
Rationale: Security programs must be driven by business goals and
acceptable risk levels.
3. Who is ultimately accountable for information security governance?
A. Information security manager
B. IT operations manager
C. Board of directors and executive management

, D. Internal audit
Rationale: Senior leadership holds accountability for governance and risk
oversight.
4. What is the PRIMARY purpose of an information security policy?
A. Define technical standards
B. Provide management direction and support for security
C. List security controls
D. Train employees
Rationale: Policies set high-level management intent and direction.
5. Which metric BEST demonstrates the effectiveness of a security governance
program?
A. Number of incidents
B. Cost of controls
C. Risk reduction aligned with business impact
D. Number of audits passed
Rationale: Effectiveness is measured by reduced risk to the business.


6. What is the FIRST step in developing an information security strategy?
A. Select security controls
B. Conduct training
C. Understand business objectives
D. Perform penetration testing
Rationale: Strategy must be based on business goals before controls are
chosen.
7. Which document defines acceptable risk levels?
A. Incident response plan
B. Security standards
C. Risk appetite statement
D. Business continuity plan
Rationale: Risk appetite formally defines acceptable levels of risk.

, 8. What is the PRIMARY benefit of aligning security strategy with enterprise
architecture?
A. Reduced costs
B. Faster deployment
C. Consistent and integrated controls
D. Simplified audits
Rationale: Alignment ensures security is built consistently across systems.
9. Who should approve the information security strategy?
A. Information security manager
B. IT manager
C. Executive management
D. Compliance officer
Rationale: Strategy approval requires executive authority.
10.What is the BEST approach to ensure continuous improvement of security
governance?
A. Annual audits
B. Regular performance measurement and reporting
C. More security tools
D. Outsourcing security
Rationale: Continuous monitoring and reporting drive improvement.


11.What is the PRIMARY objective of information risk management?
A. Eliminate all risks
B. Transfer all risks
C. Manage risk to acceptable levels
D. Avoid risk entirely
Rationale: Risk management balances risk within acceptable limits.
12.Which risk treatment option reduces likelihood or impact?
A. Avoid
B. Transfer
$17.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
alexmwangi1314

Get to know the seller

Seller avatar
alexmwangi1314 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
1 week
Number of followers
0
Documents
374
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions