CISM Certification Questions – Certified Information Security Manager

Certified Information Security Manager (CISM) is an advanced certification which indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program. It is offered by ISACA, a nonprofit, independent association that advocates for professionals involved in information security, assurance, risk management and governance.

PassQuestion is a website which can give much convenience and meet the needs and achieve dreams for many people participating IT certification exams. We at PassQuestion are positive that our CISM Certification Questions are one of the most cost-effective and comprehensive solutions for studying for your CISM exam available in the industry. we are offering you the best possible prices and our CISM Certification Questions can be studied instantly, saving you both time and money.

CISM Certification Questions – Certified Information Security Manager

1. Which of the following should be the FIRST step in developing an information security plan?

 
 
 
 

2. Senior management commitment and support for information security can BEST be obtained through presentations that:

 
 
 
 

3. The MOST appropriate role for senior management in supporting information security is the:

 
 
 
 

4. Which of the following would BEST ensure the success of information security governance within an organization?

 
 
 
 

5. Information security governance is PRIMARILY driven by:

 
 
 
 

6. Which of the following represents the MAJOR focus of privacy regulations?

 
 
 
 

7. Investments in information security technologies should be based on:

 
 
 
 

8. Retention of business records should PRIMARILY be based on:

 
 
 
 

9. Which of the following is characteristic of centralized information security management?

 
 
 
 

10. Successful implementation of information security governance will FIRST require:

 
 
 
 

11. Which of the following individuals would be in the BEST position to sponsor the creation of an information security steering group?

 
 
 
 

12. The MOST important component of a privacy policy is:

 
 
 
 

13. The cost of implementing a security control should not exceed the:

 
 
 
 

14. When a security standard conflicts with a business objective, the situation should be resolved by:

 
 
 
 

15. Minimum standards for securing the technical infrastructure should be defined in a security:

 
 
 
 

16. Which of the following is MOST appropriate for inclusion in an information security strategy?

 
 
 
 

17. Senior management commitment and support for information security will BEST be attained by an information security manager by emphasizing:

 
 
 
 

18. Which of the following roles would represent a conflict of interest for an information security manager?

 
 
 
 

19. Which of the following situations must be corrected FIRST to ensure successful information security governance within an organization?

 
 
 
 

20. Which of the following requirements would have the lowest level of priority in information security?

 
 
 
 

Leave a Reply

Your email address will not be published. Required fields are marked *