Isaca CISM Certified Information Security Manager Exam Practice Test

Page: 1 / 14
Total 801 questions
Question 1

Identifying which of the following BEST enables a cyberattack to be contained?



Answer : B


Question 2

Which of the following provides the BEST input to determine the level of protection needed for an IT system?



Answer : B


Question 3

For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?



Answer : B


Question 4

Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?



Answer : C


Question 5

Which of the following metrics would provide an accurate measure of an information security program's performance?



Answer : A


Question 6

Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?



Answer : C


Question 7

Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?



Answer : D


Page:    1 / 14   
Total 801 questions