Go Back on CISM Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

CISM Practice Test


Page 7 out of 61 Pages

Topic 1: Exam Pool A

When designing security controls, it is MOST important to:


A.

apply a risk-based approach


B.

evaluate the costs associated with the controls


C.

focus on preventive controls


D.

apply controls to confidential information





A.
  

apply a risk-based approach



Which of the following would MOST effectively communicate the benefits of an information
security program to executive management?


A.

Industry benchmarks


B.

Key performance indicators (KPIs)


C.

Threat models


D.

Key risk indicators (KRIs)





D.
  

Key risk indicators (KRIs)



Which of the following would BEST enable effective decision-making?


A.

Formalized acceptance of risk analysis by business management


B.

A consistent process to analyze new and historical information risk


C.

A universally applied list of generic threats, impacts, and vulnerabilities


D.

Annualized loss estimates determined from past security events





A.
  

Formalized acceptance of risk analysis by business management



The authorization to transfer the handling of an internal security incident
to a third-party support provider is PRIMARILY defined by the:


A.

disaster recovery plan (DRP).


B.

information security manager


C.

chain of custody.


D.

escalation procedures





D.
  

escalation procedures



To set security expectations across the enterprise, it is MOST important
for the information security policy to be regularly reviewed and endorsed by:


A.

senior management


B.

security administrators


C.

the chief information security officer (CISQ).


D.

the IT steering committee.





D.
  

the IT steering committee.




Page 7 out of 61 Pages
Previous