The ISACA Certified Information Security Manager (CISM) focuses on the management and governance of information security programs. It validates a professional's ability to align security strategy with business objectives and manage security risks effectively. Professionals with the symbol ISACA_CISM are recognized for their leadership in incident management and the development of resilient security frameworks.
---------- Question 1
A company relies heavily on a cloud service provider for critical business operations. When integrating security requirements into the contract with this external party, what is the CISM most important consideration regarding the ongoing monitoring of adherence?
- Ensuring the contract specifies the exact hardware models used by the cloud provider.
- Defining clear audit rights, reporting requirements, and performance metrics related to security.
- Requiring the cloud provider to solely use security tools approved by the company.
- Mandating that the cloud provider hire only staff with specific security certifications.
---------- Question 2
An information security incident has escalated to the point where external stakeholders, including regulators and affected customers, need to be informed. What is the CISM is primary responsibility regarding incident communication at this stage?
- To provide a highly technical deep-dive into the attack vectors used.
- To manage internal communications, ensuring employees are not disclosing information externally.
- To establish and maintain incident communication plans and processes, ensuring timely and accurate notifications to appropriate internal and external parties.
- To draft legal disclaimers to minimize the organization is liability.
---------- Question 3
After a major information security incident, the CISM leads a post-incident review. What is the most crucial outcome expected from this review to foster continuous improvement in the incident management program?
- Assigning blame to individuals or teams responsible for the incident.
- A detailed list of all system logs and network traffic captured during the incident.
- Identification of root causes, lessons learned, and actionable corrective actions to prevent recurrence or improve future responses.
- A comprehensive report justifying the original incident response budget.
---------- Question 4
A company is developing a new cloud-based application that will handle sensitive customer data. Before deployment, what is the MOST important activity the CISM should oversee to identify potential information security risks associated with this new service?
- Perform a penetration test on the deployed application.
- Conduct a comprehensive threat modeling and risk assessment tailored to the cloud environment.
- Implement a robust incident response plan for the application.
- Purchase cyber insurance to cover potential data breaches.
---------- Question 5
An organization is expanding into new international markets, introducing complex legal and regulatory requirements. What is the CISM's MOST crucial initial action to ensure the information security strategy adequately addresses these external influences?
- Update technical security controls to meet the highest global standard.
- Conduct a comprehensive review of applicable legal, regulatory, and contractual requirements in the new markets.
- Increase the budget for security personnel and training.
- Implement a new security awareness campaign targeting international employees.
---------- Question 6
During a risk assessment, a CISM identifies a critical vulnerability that, if exploited, could lead to a significant data breach. The cost of fully remediating this vulnerability is prohibitively high. What is the most appropriate next step for the CISM to recommend, adhering to sound risk management principles?
- Accept the risk, as remediation is too costly.
- Transfer the risk through a cybersecurity insurance policy.
- Implement compensating controls and monitor the vulnerability closely.
- Eliminate the system containing the vulnerability immediately.
---------- Question 7
An organization uses a cloud service provider (third party), which in turn relies on another subcontractor (fourth party) for data processing. The CISM must ensure security requirements extend to this fourth party. What is the BEST approach?
- Assume the third party is solely responsible for its subcontractors security.
- Mandate security audits only for the primary cloud service provider.
- Include provisions in the third-party contract requiring them to enforce security for their subcontractors and grant audit rights.
- Rely on the fourth partys public security certifications without further verification.
---------- Question 8
A CISM is reviewing the organizations incident management readiness. A key business application has a high business impact rating in the Business Impact Analysis BIA but its recovery point objective RPO is inconsistently applied across various recovery plans. What is the CISM primary concern and immediate action?
- Focusing on updating the Disaster Recovery Plan DRP for the application immediately
- Ensuring the Incident Response Plan IRP includes specific steps for ransomware recovery
- Aligning the RPO across BIA BCP and DRP to ensure consistent recovery expectations
- Conducting an emergency table-top exercise for the application
---------- Question 9
A CISM needs to present the overall effectiveness of the information security program to diverse stakeholders, including technical managers, business unit heads, and the audit committee. What is the MOST effective approach for communication?
- Presenting raw technical data, such as vulnerability scan results and firewall logs, to demonstrate security activities.
- Providing a single, highly detailed report containing all security metrics and operational details.
- Tailoring reports with relevant metrics and language that resonate with each stakeholder group business concerns.
- Focusing exclusively on compliance achievements to satisfy legal and regulatory requirements.
---------- Question 10
Following a successful phishing attack that led to unauthorized access to several employee accounts, the CISO initiates a post-incident review. What is the PRIMARY objective of conducting this review to facilitate continuous improvement?
- Assign blame to individual employees who clicked the malicious link.
- Focus solely on documenting the steps taken during the incident.
- Identify root causes, document lessons learned, define corrective actions, and reassess associated risks to prevent recurrence and enhance future response capabilities.
- Use the review as a basis for immediate widespread employee disciplinary actions.
Are they useful?
Click here to get 900 more questions to pass this certification at the first try! Explanation for each answer is included!
Follow the below LINKEDIN channel to stay updated about 89+ exams!

Comments
Post a Comment