Download Certified Information Security Manager.CISM.ExamTopics.2026-04-10.392q.tqb

Vendor: ISACA
Exam Code: CISM
Exam Name: Certified Information Security Manager
Date: Apr 10, 2026
File Size: 1 MB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
Who is BEST suited to determine how the information in a database should be classified?
  1. Information security analyst
  2. Database analyst
  3. Database administrator (DBA)
  4. Data owner
Correct answer: D
Question 2
Which of the following is the BEST way to demonstrate the alignment of the information security strategy with the business strategy?
  1. Show the relationship between information security goals and corporate goals.
  2. Compare the allocated budget for business with the information security budget.
  3. Present senior management's approval of information security policies.
  4. Provide evidence that information security is included in the change management process.
Correct answer: A
Question 3
An information security manager has received confirmation that the organization's e-commerce website was breached, exposing customer information. What should be done FIRST?
  1. Inform affected customers
  2. Perform a vulnerability assessment
  3. Execute the incident response plan
  4. Take the affected systems offline
Correct answer: C
Question 4
Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?
  1. Identify and assess the risk in the context of business objectives
  2. Consult with IT staff and assess the risk based on their recommendations
  3. Update the security policy based on the regulatory requirements
  4. Propose relevant controls to ensure the business complies with the regulation
Correct answer: A
Question 5
What is the PRIMARY goal of an incident management program?
  1. Contain the incident
  2. Communicate to external entities
  3. Minimize impact to the organization
  4. Identify root cause
Correct answer: C
Question 6
Which of the following parties should be responsible for determining access levels to an application that processes client information?
  1. The identity and access management team
  2. The business client
  3. The information security team
  4. Business unit management
Correct answer: D
Question 7
To support effective risk decision making, which of the following is MOST important to have in place?
  1. An audit committee consisting of mid-level management
  2. Risk reporting procedures
  3. Well-defined and approved controls
  4. Established risk domains
Correct answer: B
Question 8
When deciding to move to a cloud-based model, the FIRST consideration should be:
  1. data classification
  2. physical location of the data
  3. storage in a shared environment
  4. availability of the data
Correct answer: A
Question 9
An information security manager determines there are a significant number of exceptions to a newly released industry-required security standard. Which of the following should be done NEXT?
  1. Document risk acceptances.
  2. Conduct an information security audit.
  3. Assess the consequences of noncompliance.
  4. Revise the organization's security policy.
Correct answer: C
Question 10
An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:
  1. a control self-assessment (CSA) process.
  2. metrics for each milestone.
  3. automated reporting to stakeholders.
  4. a monitoring process for the security policy.
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!