Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CISM Practice Exam with Questions & Answers

Questions 1

Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?

Options:
A.

It transfers the risk associated with recovery to a third party.

B.

It lowers the annual cost to the business.

C.

It eliminates the need to maintain offsite facilities.

D.

It eliminates the need for the business to perform testing.

Isaca CISM Premium Access
Questions 2

When collecting admissible evidence, which of the following is the MOST important requirement?

Options:
A.

Need to know

B.

Preserving audit logs

C.

Due diligence

D.

Chain of custody

Questions 3

Which of the following is the MOST essential element of an information security program?

Options:
A.

Benchmarking the program with global standards for relevance

B.

Prioritizing program deliverables based on available resources

C.

Involving functional managers in program development

D.

Applying project management practices used by the business

Questions 4

Which of the following BEST indicates that an information security governance framework has been successfully implemented?

Options:
A.

The framework aligns internal and external resources.

B.

The framework aligns security processes with industry best practices.

C.

The framework aligns management and other functions within the security organization.

D.

The framework includes commercial off-the-shelf security solutions.

Questions 5

The PRIMARY benefit of introducing a single point of administration in network monitoring is that it:

Options:
A.

reduces unauthorized access to systems.

B.

promotes efficiency in control of the environment.

C.

prevents inconsistencies in information in the distributed environment.

D.

allows administrative staff to make management decisions.

Questions 6

Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?

Options:
A.

Documentation of control procedures

B.

Standardization of compliance requirements

C.

Automation of controls

D.

Integration of assurance efforts

Questions 7

After a server has been attacked, which of the following is the BEST course of action?

Options:
A.

Initiate incident response.

B.

Review vulnerability assessment.

C.

Conduct a security audit.

D.

Isolate the system.

Questions 8

A PRIMARY benefit of adopting an information security framework is that it provides:

Options:
A.

credible emerging threat intelligence.

B.

security and vulnerability reporting guidelines.

C.

common exploitability indices.

D.

standardized security controls.

Questions 9

An information security manager is alerted to multiple security incidents across different business units, with unauthorized access to sensitive data and potential data exfiltration from critical systems. Which of the following is the BEST course of action to appropriately classify and prioritize these incidents?

Options:
A.

Assemble the incident response team to evaluate the incidents

B.

Initiate the crisis communication plan to notify stakeholders of the incidents

C.

Engage external incident response consultants to conduct an independent investigation

D.

Prioritize the incidents based on data classification standards

Questions 10

During which phase of an incident response plan is the root cause determined?

Options:
A.

Recovery

B.

Lessons learned

C.

Containment

D.

Eradication

Questions 11

A new regulatory requirement affecting an organization's information security program is released. Which of the following should be the information security manager's FIRST course of action?

Options:
A.

Perform a gap analysis.

B.

Conduct benchmarking.

C.

Notify the legal department.

D.

Determine the disruption to the business.

Questions 12

Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?

Options:
A.

Alignment with financial reporting

B.

Alignment with business initiatives

C.

Alignment with industry frameworks

D.

Alignment with risk appetite

Questions 13

When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?

Options:
A.

Business process owner

B.

Business continuity coordinator

C.

Senior management

D.

Information security manager

Questions 14

Which of the following is BEST used to determine the maturity of an information security program?

Options:
A.

Security budget allocation

B.

Organizational risk appetite

C.

Risk assessment results

D.

Security metrics

Questions 15

Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?

Options:
A.

Enhanced data governance

B.

Increased third-party assurance

C.

)Improved incident management

D.

Reduced total cost of ownership (TCO)

Questions 16

A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?

Options:
A.

Update in accordance with the best business practices.

B.

Perform a risk assessment of the current IT environment.

C.

Gain an understanding of the current business direction.

D.

Inventory and review current security policies.

Questions 17

The MOST useful technique for maintaining management support for the information security program is:

Options:
A.

informing management about the security of business operations.

B.

implementing a comprehensive security awareness and training program.

C.

identifying the risks and consequences of failure to comply with standards.

D.

benchmarking the security programs of comparable organizations.

Questions 18

A global organization is considering its geopolitical security risks. Which of the following is the information security manager's BEST approach?

Options:
A.

Seek advice from environmental and physical security experts

B.

Implement a third-party risk management framework

C.

Implement controls that deny access from specific jurisdictions

D.

Seek advice from enterprise risk and legal experts

Questions 19

Of the following, who is in the BEST position to evaluate business impacts?

Options:
A.

Senior management

B.

Information security manager

C.

IT manager

D.

Process manager

Questions 20

Which of the following is the BEST indication of a mature information security program?

Options:
A.

Security incidents are managed properly.

B.

Security spending is below budget.

C.

Security resources are optimized.

D.

Security audit findings are reduced.

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.