Black Friday Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 15
Total 291 questions
Exam Code: CISM                Update: Nov 30, 2025
Exam Name: Certified Information Security Manager

Isaca Certified Information Security Manager CISM Exam Dumps: Updated Questions & Answers (November 2025)

Question # 1

An employee who is a remote user has copied financial data from the corporate server to a laptop using virtual private network (VPN) connectivity. Which of the following is the MOST important factor to determine if it should be classified as a data leakage incident?

A.

Review of the audit logs

B.

Ownership of the data

C.

Employee's job role

D.

Valid use case

Question # 2

When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?

A.

Managing the impact

B.

Identifying unacceptable risk levels

C.

Assessing vulnerabilities

D.

Evaluating potential threats

Question # 3

Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?

A.

Record and close security incident tickets.

B.

Test and verify that compromisedsystems are clean.

C.

Document recovery steps for senior management reporting.

D.

Capture and preserve forensic images of affected systems.

Question # 4

Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?

A.

An industry peer experienced a recent breach with a similar application.

B.

The system can be replicated for additional use cases.

C.

The cost of implementing the system is less than the impact of downtime.

D.

The solution is within the organization's risk tolerance.

Question # 5

Which of the following should be the PRIMARY focus for an information security manager when reviewing access controls for data stored in an off-premise cloud environment?

A.

Reviewing and updating access controls in response to changes in organizational structure

B.

Implementing strong password policies and enforcing regular password changes

C.

Ensuring access is granted to only those individuals whose job functions require it

D.

Implementing strong encryption protocols to protect sensitive data

Question # 6

Which of the following is the MOST effective defense against malicious insiders compromising confidential information?

A.

Regular audits of access controls

B.

Strong background checks when hiring staff

C.

Prompt termination procedures

D.

Role-based access control (RBAC)

Question # 7

Which of the following is the BEST option to lower the cost to implement application security controls?

A.

Perform security tests in the development environment.

B.

Integrate security activities within the development process

C.

Perform a risk analysis after project completion.

D.

Include standard application security requirements

Question # 8

An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?

A.

Data masking

B.

Data retention strategy

C.

Data encryption standards

D.

Data loss prevention (DLP)

Question # 9

Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?

A.

Senior management

B.

Information owner

C.

Business manager

D.

Information security manager

Question # 10

Which of the following should be of GREATEST concern regarding an organization's security controls?

A.

Some controls are performing outside of an acceptable range.

B.

No key control indicators (KCIs) have been implemented.

C.

Control ownership has not been updated.

D.

Control gap analysis is outdated.

Question # 11

What is the PRIMARY objective of performing a vulnerability assessment following a business system update?

A.

Determine operational losses.

B.

Improve the change control process.

C.

Update the threat landscape.

D.

Review the effectiveness of controls

Question # 12

Of the following, who is accountable for data loss in the event of an information security incident at a third-party provider?

A.

The information security manager

B.

The service provider that hosts the data

C.

The incident response team

D.

The business data owner

Question # 13

An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?

A.

Refer the issue to internal audit for a recommendation.

B.

Re-classify the data and increase the security level to meet business risk.

C.

Instruct the relevant system owners to reclassify the data.

D.

Complete a risk assessment and refer the results to the data owners.

Question # 14

Which of the following is MOST likely to reduce the effectiveness of a SIEM system?

A.

Lack of multi-factor authentication (MFA) for system access

B.

Weakly encrypted log files

C.

Misconfiguration of alert thresholds

D.

Complex user interface

Question # 15

An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?

A.

Employees use smartphone tethering when accessing from remote locations.

B.

Employees physically lock PCs when leaving the immediate area.

C.

Employees are trained on the acceptable use policy.

D.

Employees use the VPN when accessing the organization's online resources.

Question # 16

Which of the following is the GREATEST challenge with assessing emerging risk in an organization?

A.

Lack of a risk framework

B.

Ineffective security controls

C.

Presence of known vulnerabilities

D.

Incomplete identification of threats

Question # 17

Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?

A.

Disconnect the system from the network.

B.

Change passwords on the compromised system.

C.

Restore the system from a known good backup.

D.

Perform operation system hardening.

Question # 18

During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?

A.

The certification includes industry-recognized security controls.

B.

The certification was issued within the last five years.

C.

The certification is issued for the specific scope.

D.

The certification is easily verified.

Question # 19

Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?

A.

Enable multi-factor authentication on user and admin accounts.

B.

Review access permissions annually or whenever job responsibilities change

C.

Lock out accounts after a set number of unsuccessful login attempts.

D.

Delegate the management of access permissions to an independent third party.

Question # 20

Which is MOST important to identify when developing an effective information security strategy?

A.

Security awareness training needs

B.

Potential savings resulting from security governance

C.

Business assets to be secured

D.

Residual risk levels

Page: 1 / 15
Total 291 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 30 Nov 2025