100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CERTIFIED INFORMATION SECURITY MANAGER (CISM) EXAMINATION PRACTICE Exam QUESTIONS with Answers and Rationales Question And Correct Answers (Verified Answers) Plus Rationales 2026 Q&A |Instant Download Pdf

Rating
-
Sold
-
Pages
26
Grade
A+
Uploaded on
10-12-2025
Written in
2025/2026

CERTIFIED INFORMATION SECURITY MANAGER (CISM) EXAMINATION PRACTICE Exam QUESTIONS with Answers and Rationales Question And Correct Answers (Verified Answers) Plus Rationales 2026 Q&A |Instant Download Pdf

Institution
CERTIFIED INFORMATION SECURITY MANAGER
Course
CERTIFIED INFORMATION SECURITY MANAGER










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CERTIFIED INFORMATION SECURITY MANAGER
Course
CERTIFIED INFORMATION SECURITY MANAGER

Document information

Uploaded on
December 10, 2025
Number of pages
26
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CERTIFIED INFORMATION SECURITY
MANAGER (CISM) EXAMINATION
PRACTICE Exam QUESTIONS with
Answers and Rationales Question And
Correct Answers (Verified Answers) Plus
Rationales 2026 Q&A |Instant
Download Pdf
1.
Which of the following is the MOST important responsibility of an information
security manager when integrating security into business processes?
A. Ensuring compliance with security best practices
B. Educating senior management on security trends
C. Aligning security requirements with business objectives
D. Implementing technical controls
Rationale: Security must support business goals; alignment ensures acceptable
risk levels while enabling operations.
2.
What is the PRIMARY purpose of an information security governance framework?
A. To define technical standards
B. To ensure security supports business objectives
C. To assign incident responsibilities
D. To enforce regulatory requirements
Rationale: Governance establishes direction so security formally supports and
aligns with business strategy.

,3.
Which metric BEST measures the effectiveness of an information security
program?
A. Number of vulnerabilities detected
B. Number of incidents reported
C. Reduction in business impact from security incidents
D. Number of policies published
Rationale: Effectiveness is measured by minimized business impact, not activity
counts.
4.
A critical system’s RPO (Recovery Point Objective) is 15 minutes. What should the
information security manager ensure?
A. Backups occur hourly
B. Data can be restored to within 15 minutes of loss
C. System downtime does not exceed 15 minutes
D. Staff are trained on backup procedures
Rationale: RPO defines acceptable data loss; recovery must meet the 15-minute
threshold.
5.
What is the MOST important factor when defining an information security
strategy?
A. Industry best practices
B. Technology capabilities
C. Customer expectations
D. Business goals and risk appetite
Rationale: Strategy must support business needs and acceptable risk levels.
6.
Which of the following BEST supports risk-based decision-making?
A. Compliance checklists
B. A formally defined risk appetite statement

, C. Incident response metrics
D. Threat intelligence feeds
Rationale: Risk appetite guides which risks are accepted, mitigated, or
transferred.
7.
Which of the following should be the FIRST step in developing an information
security program?
A. Drafting policies
B. Conducting a vulnerability assessment
C. Understanding business requirements
D. Creating awareness materials
Rationale: The program must be built around business needs and priorities.
8.
Who should approve the enterprise information security policy?
A. IT director
B. Information security manager
C. Executive management
D. Security steering committee
Rationale: Executive management provides authority and ownership for
enterprise-wide policies.
9.
Which action MOST improves the maturity of a security program?
A. Increasing number of tools
B. Hiring more staff
C. Performing internal audits
D. Implementing continuous improvement processes
Rationale: Maturity is reached through repeatable and continually improved
processes.
10.
R388,68
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
alexmwangi1314

Get to know the seller

Seller avatar
alexmwangi1314 Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
1 week
Number of followers
0
Documents
374
Last sold
-

0,0

0 reviews

5
0
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions