ISACA CISM Certified Information Security Manager Online Training
ISACA CISM Online Training
The questions for CISM were last updated at Apr 28,2025.
- Exam Code: CISM
- Exam Name: Certified Information Security Manager
- Certification Provider: ISACA
- Latest update: Apr 28,2025
Which of the following sites would be MOST appropriate in the case of a very short recovery time objective (RTO)?
- A . Redundant
- B . Shared
- C . Warm
- D . Mobile
Which of the following is the BEST indication that a recently adopted information security framework is a good fit for an organization?
- A . The framework includes industry-recognized information security best practices.
- B . The number of security incidents has significantly declined
- C . The business has obtained framework certification.
- D . Objectives in the framework correlate directly to business practices
Which of the following is the BEST indication that a recently adopted information security framework is a good fit for an organization?
- A . The framework includes industry-recognized information security best practices.
- B . The number of security incidents has significantly declined
- C . The business has obtained framework certification.
- D . Objectives in the framework correlate directly to business practices
Which of the following is MOST likely to result from a properly conducted post-incident review?
- A . Breach information is provided to the organization’s key stakeholders and users.
- B . The cause of the incident is discovered and remediated.
- C . Forensic evidence is reviewed and provided to law enforcement
- D . The incident response team discovers inefficiencies in the recovery process.
Labeling information according to its security classification:
- A . affects the consequences if information is handled insecurely,
- B . induces the number and type of counter measures required
- C . enhances the likelihood of people handling information securely,
- D . reduces the need to identify baseline controls for each classification.
Which of the following is MOST likely to result from a properly conducted post-incident review?
- A . Breach information is provided to the organization’s key stakeholders and us«rs.
- B . The cause of the incident is discovered and remediated.
- C . Forensic evidence is reviewed and provided to law enforcement
- D . The incident response team discovers inefficiencies in the recovery process.
Which of the following would provide senior management with the BEST overview of the performance of information security risk treatment options?
- A . Before-and-after heat maps
- B . Analysis of recent incident
- C . Detailed risk analysis of the treatments
- D . individual risk assessments
The GREATEST benefit of choosing a private cloud over a public cloud would be:
- A . containment of customer data
- B . collection of data forensic
- C . online service availability.
- D . server protection.
The PRIMARY reason an organization would require that users sign an acknowledgment of their system access responsibilities is to:
- A . assign accountability for transactions made with the user’s ID.
- B . maintain compliance with industry best practices.
- C . serve as evidence of security awareness training.
- D . maintain an accurate record of users access rights
Which of the following is MOST important to the successful development of an information security strategy?
- A . An implemented development life cycle process
- B . A well-implemented governance framework
- C . Current state and desired objectives
- D . Approved policies and standards