ISACA CISM Certified Information Security Manager Online Training
ISACA CISM Online Training
The questions for CISM were last updated at Dec 03,2025.
- Exam Code: CISM
- Exam Name: Certified Information Security Manager
- Certification Provider: ISACA
- Latest update: Dec 03,2025
Which of the following is the MOST effective defense against spear phishing attacks?
- A . Unified threat management
- B . Web filtering
- C . Anti-spam solution
- D . User awareness training
Which of the following provides the MOST relevant evidence of incident response maturity?
- A . Red team testing results
- B . Average incident closure time
- C . Independent audit assessment
- D . Tabletop exercise results
Relying on which of the following methods when detecting new threats using IDS should be of MOST concern?
- A . Statistical pattern recognition
- B . Attack signatures
- C . Heuristic analysis
- D . Traffic analysis
Which is MOST important to enable a timely response to a security breach?
- A . Knowledge sharing and collaboration
- B . Security event logging
- C . Roles and responsibilities
- D . Forensic analysis
Which of the following is the BEST way to increase the visibility of information security within an organization’s culture?
- A . Requiring cross-functional information security training
- B . Implementing user awareness campaigns for the entire company
- C . Publishing an acceptable use policy
- D . Establishing security policies based on industry standards
After a server has been attacked, which of the following is the BEST course of action?
- A . Review vulnerability assessment
- B . Conduct a security audit
- C . Initiate modem response
- D . Isolate the system.
Which of the following is the MOST important driver when developing an effective information security strategy?
- A . Information security standards
- B . Compliance requirements
- C . Security audit reports
- D . Benchmarking reports
An information security manager is reviewing the impact of a regulation on the organization’s human resources system.
The NEXT course of action should be to:
- A . perform a gap analysis of compliance requirements
- B . assess the penalties for noncompliance.
- C . review the organization s most recent audit report
- D . determine the cost of compliance
Which of the following is the MOST important outcome from vulnerability scanning?
- A . Prioritization of risks
- B . Information about steps necessary to hack the system
- C . Identification of back doors
- D . Verification that systems are property configured
Which of the following would provide nonrepudiation of electronic transactions?
- A . Two-factor authentication
- B . Periodic reaccredinations
- C . Third-party certificates
- D . Receipt acknowledgment