CISM - Certified Information Security Manager CISM Topic 1
CISM - Certified Information Security Manager CISM Topic 1
Selected Answer: B
Question #: 1099
Topic #: 1
Which of the following is MOST important for effective cybersecurity
incident management?
Selected Answer: B
Question #: 420
Topic #: 1
Which of the following roles is accountable for ensuring the impact of a
new regulatory framework on a business system is assessed?
A. Senior management
B. Application owner
https://awslagi.com/course/cism/lessons/cism-topic-1/ 1/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
C. Legal representative
D. Information security manager
Selected Answer: A
Question #: 676
Topic #: 1
An organization is going through a digital transformation process,
which places the IT organization in an unfamiliar risk landscape. The
information security manager has been tasked with leading the IT risk
management process. Which of the following should be given the
HIGHEST priority?
A. Identification of risk
B. Selection of risk treatment options
C. Analysis of control gaps
D. Design of key risk indicators (KRIs)
Selected Answer: A
Question #: 674
Topic #: 1
Which of the following is the BEST tool to monitor the effectiveness of
information security governance?
A. Balanced scorecard
B. Risk profile
C. Business impact analysis (BIA)
D. Key performance indicators (KPIs)
Selected Answer: A
Question #: 2
Topic #: 1
In a multinational organization, local security regulations should be
implemented over global security policy because:
https://awslagi.com/course/cism/lessons/cism-topic-1/ 2/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
businesses.
D. requirements of local regulations take precedence.
Selected Answer: D
Question #: 667
Topic #: 1
Of the following, who is in the BEST position to evaluate business
impacts?
A. Senior management
B. Information security manager
C. Process manager
D. IT manager
Selected Answer: C
Question #: 655
Topic #: 1
Which of the following should an information security manager do
FIRST when a mandatory security standard hinders the achievement of
an identified business objective?
Selected Answer: B
Question #: 653
Topic #: 1
A recovery point objective (RPO) is required in which of the following?
Selected Answer: A
https://awslagi.com/course/cism/lessons/cism-topic-1/ 3/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 1
Topic #: 1
An information security risk analysis BEST assists an organization in
ensuring that:
Selected Answer: B
Question #: 1099
Topic #: 1
Which of the following is MOST important for effective cybersecurity
incident management?
Selected Answer: B
Question #: 420
Topic #: 1
Which of the following roles is accountable for ensuring the impact of a
new regulatory framework on a business system is assessed?
A. Senior management
B. Application owner
C. Legal representative
D. Information security manager
Selected Answer: A
Question #: 1113
Topic #: 1
Which of the following should have the MOST influence on an
organization’s response to a new industry regulation?
https://awslagi.com/course/cism/lessons/cism-topic-1/ 4/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: D
Question #: 171
Topic #: 1
An organization performed a risk analysis and found a large number of
assets with low-impact vulnerabilities. The NEXT action of the
information security manager should be to:
Selected Answer: D
Question #: 631
Topic #: 1
Which of the following is the MOST important reason to document
information security incidents that are reported across the
organization?
Selected Answer: D
Question #: 988
Topic #: 1
Which of the following MUST be established to maintain an effective
information security governance framework?
https://awslagi.com/course/cism/lessons/cism-topic-1/ 5/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: D
Question #: 908
Topic #: 1
Which of the following is the MOST important consideration when
defining an information security framework?
Selected Answer: C
Question #: 654
Topic #: 1
Which of the following provides the BEST assurance that security
policies are applied across business operations?
Selected Answer: A
Question #: 610
Topic #: 1
An organization involved in e-commerce activities operating from its
home country opened a new office in another country with stringent
security laws. In this scenario, the overall security strategy should be
based on:
Selected Answer: C
https://awslagi.com/course/cism/lessons/cism-topic-1/ 6/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 609
Topic #: 1
Information security controls should be designed PRIMARILY based on:
A. regulatory requirements.
B. a vulnerability assessment.
C. business risk scenarios.
D. a business impact analysis (BIA).
Selected Answer: C
Question #: 639
Topic #: 1
An information security team has discovered that users are sharing a
login account to an application with sensitive information, in violation
of the access policy. Business management indicates that the practice
creates operational efficiencies. What is the information security
manager’s BEST course of action?
Selected Answer: A
Question #: 614
Topic #: 1
An organization has identified a risk scenario that has low impact to
the organization but is very costly to mitigate. Which risk treatment
option is MOST appropriate in this situation?
A. Transfer
B. Acceptance
C. Mitigation
D. Avoidance
Selected Answer: B
Question #: 527
Topic #: 1
https://awslagi.com/course/cism/lessons/cism-topic-1/ 7/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
The MOST effective tools for responding to new and advanced attacks
are those that detect attacks based on:
A. behavior analysis.
B. penetration testing.
C. signature analysis.
D. data packet analysis.
Selected Answer: A
Question #: 30
Topic #: 1
What should be an information security manager’s FIRST step when
developing a business case for a new intrusion detection system (IDS)
solution?
Selected Answer: B
Question #: 588
Topic #: 1
An organization that conducts business globally is planning to utilize a
third-party service provider to process payroll information. Which of
the following issues poses the GREATEST risk to the organization?
A. The third party has not provided evidence of compliance with local
regulations where data is generated.
B. The third party does not have an independent assessment of controls
available for review.
C. The third party’s service level agreement (SLA) does not include
guarantees of uptime.
D. The third-party contract does not include an indemnity clause for
compensation in the event of a breach.
Selected Answer: D
https://awslagi.com/course/cism/lessons/cism-topic-1/ 8/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 580
Topic #: 1
Which of the following would BEST provide stakeholders with
information to determine the appropriate response to a disaster?
A. Vulnerability assessment
B. SWOT analysis
C. Business impact analysis (BIA)
D. Risk assessment
Selected Answer: D
Question #: 587
Topic #: 1
Which of the following is the MOST appropriate resource to determine
whether or not a particular solution should utilize encryption based on
its location and data classification?
A. Guidelines
B. Procedures
C. Standards
D. Policies
Selected Answer: D
Question #: 586
Topic #: 1
Which of the following is the MOST important control to implement
when senior managers use smartphones to access sensitive company
information?
Selected Answer: A
Question #: 551
Topic #: 1
https://awslagi.com/course/cism/lessons/cism-topic-1/ 9/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
A. Regulatory requirements
B. Management support
C. Threat landscape
D. Resource availability
Selected Answer: C
Question #: 507
Topic #: 1
Which of the following is the MOST effective way to ensure information
security policies are understood?
Selected Answer: D
Question #: 574
Topic #: 1
Which of the following is MOST important to ensure when an
organization is moving portions of its sensitive database to the cloud?
Selected Answer: C
Question #: 571
Topic #: 1
A new law requires an organization to implement specific security
controls. Which of the following should the information security
manager do FIRST?
Selected Answer: B
Question #: 548
Topic #: 1
An event occurred that resulted in the activation of the business
continuity plan (BCP). All employees were notified during the event,
and they followed the plan.
However, two major suppliers missed deadlines because they were not
aware of the disruption. What is the BEST way to prevent a similar
situation in the future?
Selected Answer: C
Question #: 547
Topic #: 1
Which of the following should an information security manager do
FIRST to address the risk associated with a new third-party cloud
application that will not meet organizational security requirements?
Selected Answer: C
Question #: 529
Topic #: 1
What is the PRIMARY objective of information security involvement in
the change management process?
https://awslagi.com/course/cism/lessons/cism-topic-1/ 11/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: C
Question #: 502
Topic #: 1
Which of the following is the BEST way to prevent insider threats?
Selected Answer: C
Question #: 563
Topic #: 1
Which of the following BEST conveys minimum information security
requirements to an organization in alignment with policies?
A. Procedures
B. Regulations
C. Baselines
D. Standards
Selected Answer: D
Question #: 404
Topic #: 1
A newly appointed information security manager has been asked to
update all security-related policies and procedures that have been
static for five years or more. What is the BEST next step?
Selected Answer: D
https://awslagi.com/course/cism/lessons/cism-topic-1/ 12/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 374
Topic #: 1
Which of the following would BEST support an information security
manager’s efforts to obtain management approval for an identity and
access management
(IAM) system implementation?
Selected Answer: D
Question #: 373
Topic #: 1
An organization that has outsourced its incident management
capabilities just discovered a significant privacy breach by an unknown
attacker. Which of the following is the MOST important action of the
information security manager?
Selected Answer: B
Question #: 549
Topic #: 1
When performing a data classification project, an information security
manager should:
Selected Answer: A
https://awslagi.com/course/cism/lessons/cism-topic-1/ 13/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 414
Topic #: 1
The department head of application development has decided to accept
the risks identified in a recent assessment. No recommendations will be
implemented, even though the recommendations are required by
regulatory oversight. What should the information security manager do
NEXT?
Selected Answer: A
Question #: 538
Topic #: 1
Which of the following should an information security manager do
NEXT after creating a roadmap to execute the strategy for an
information security program?
Selected Answer: A
Question #: 92
Topic #: 1
What is the PRIMARY benefit of effective configuration management?
Selected Answer: C
Question #: 86
Topic #: 1
https://awslagi.com/course/cism/lessons/cism-topic-1/ 14/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: C
Question #: 61
Topic #: 1
An information security manager wants to improve the ability to
identify changes in risk levels affecting the organization’s systems.
Which of the following is the
BEST method to achieve this objective?
Selected Answer: C
Question #: 29
Topic #: 1
Deciding the level of protection a particular asset should be given is
BEST determined by:
Selected Answer: A
Question #: 18
Topic #: 1
Which of the following should be an information security managers
https://awslagi.com/course/cism/lessons/cism-topic-1/ 15/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: A
Question #: 16
Topic #: 1
The PRIMARY reason for defining the information security roles and
responsibilities of staff throughout an organization is to:
Selected Answer: C
Question #: 15
Topic #: 1
Which of the following is the BEST way to ensure that organizational
security policies comply with data security regulatory requirements?
Selected Answer: C
Question #: 14
Topic #: 1
An organization that uses external cloud services extensively is
concerned with risk monitoring and timely response. The BEST way to
address this concern is to ensure:
Selected Answer: B
Question #: 387
Topic #: 1
Reverse lookups can be used to prevent successful:
Selected Answer: D
Question #: 70
Topic #: 1
An information security manager is implementing a bring your own
device (BYOD) program. Which of the following would BEST ensure that
users adhere to the security standards?
Selected Answer: C
Question #: 361
Topic #: 1
During the eradication phase of an incident response, it is MOST
important to:
Selected Answer: D
https://awslagi.com/course/cism/lessons/cism-topic-1/ 17/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 353
Topic #: 1
The PRIMARY advantage of performing black-box control tests as
opposed to white-box control tests is that they:
Selected Answer: A
Question #: 87
Topic #: 1
Which of the following BEST provides an information security manager
with sufficient assurance that a service provider complies with the
organization’s information security requirements?
Selected Answer: D
Question #: 84
Topic #: 1
An information security manager has been informed of a new
vulnerability in an online banking application, and a patch to resolve
this issue is expected to be released in the next 72 hours. Which of the
following should the information security manager do FIRST?
Selected Answer: C
https://awslagi.com/course/cism/lessons/cism-topic-1/ 18/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 496
Topic #: 1
An intrusion has been detected and contained. Which of the following
steps represents the BEST practice for ensuring the integrity of the
recovered system?
Selected Answer: B
Question #: 465
Topic #: 1
Using which of the following metrics will BEST help to determine the
resiliency of IT infrastructure security controls?
Selected Answer: B
Question #: 981
Topic #: 1
When an organization lacks internal expertise to conduct highly
technical forensics investigations, what is the BEST way to ensure
effective and timely investigations following an information security
incident?
Selected Answer: B
Question #: 542
Topic #: 1
https://awslagi.com/course/cism/lessons/cism-topic-1/ 19/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: D
Question #: 458
Topic #: 1
An organization permits the storage and use of its critical and sensitive
information on employee-owned smartphones. Which of the following
is the BEST security control?
Selected Answer: B
Question #: 1166
Topic #: 1
When engaging an external party to perform a penetration test, it is
MOST important to:
Selected Answer: C
Question #: 9
Topic #: 1
Which of the following should an information security manager do
FIRST when a legacy application is not compliant with a regulatory
https://awslagi.com/course/cism/lessons/cism-topic-1/ 20/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
requirement, but the business unit does not have the budget for
remediation?
Selected Answer: D
Question #: 213
Topic #: 1
An information security manager is asked to provide a short
presentation on the organization’s current IT risk posture to the board
of directors. Which of the following would be MOST effective to include
in this presentation?
Selected Answer: D
Question #: 190
Topic #: 1
The MOST effective way to continuously monitor an organization’s
cybersecurity posture is to evaluate its:
Selected Answer: B
Question #: 181
Topic #: 1
https://awslagi.com/course/cism/lessons/cism-topic-1/ 21/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: C
Question #: 79
Topic #: 1
Which of the following is the MOST important consideration when
selecting members for an information security steering committee?
Selected Answer: D
Question #: 75
Topic #: 1
When developing a tabletop test plan for incident response testing, the
PRIMARY purpose of the scenario should be to:
Selected Answer: B
Question #: 1090
Topic #: 1
When an organization experiences a disruptive event, the business
continuity plan (BCP) should be triggered PRIMARILY based on:
https://awslagi.com/course/cism/lessons/cism-topic-1/ 22/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: D
Question #: 1068
Topic #: 1
Which of the following is the BEST indication that an information
security control is no longer relevant?
Selected Answer: B
Question #: 1027
Topic #: 1
Which of the following defines the MOST comprehensive set of security
requirements for a newly developed information system?
A. Baseline controls
B. Audit findings
C. Risk assessment results
D. Key risk indicators (KRIs)
Selected Answer: A
Question #: 994
Topic #: 1
Which of the following BEST indicates senior management support for
an information security program?
A. Top-down communication
B. Regular security awareness training
C. Participation in a certification program
D. Steering committee involvement
Selected Answer: D
https://awslagi.com/course/cism/lessons/cism-topic-1/ 23/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 966
Topic #: 1
Which of the following is the MOST important consideration when
briefing executives about the current state of the information security
program?
Selected Answer: C
Question #: 952
Topic #: 1
Which of the following is the BEST way to contain an SQL injection
attack that has been detected by a web application firewall?
Selected Answer: B
Question #: 945
Topic #: 1
Which of the following would MOST effectively ensure that a new
server is appropriately secured?
Selected Answer: D
Question #: 910
Topic #: 1
Which of the following is the BEST way to determine the effectiveness
of an incident response plan?
https://awslagi.com/course/cism/lessons/cism-topic-1/ 24/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: D
Question #: 894
Topic #: 1
Which of the following BEST mitigates the risk or information loss
caused by a cloud service provider becoming insolvent?
Selected Answer: C
Question #: 852
Topic #: 1
Which of the following is an information security manager’s MOST
important action to mitigate the risk associated with malicious
software?
Selected Answer: B
Question #: 777
Topic #: 1
When performing a business impact analysis (BIA), who should
calculate the recovery time and cost estimates?
https://awslagi.com/course/cism/lessons/cism-topic-1/ 25/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: A
Question #: 769
Topic #: 1
Which of the following BEST enables an organization to provide
ongoing assurance that legal and regulatory compliance requirements
can be met?
Selected Answer: D
Question #: 147
Topic #: 1
Which of the following is MOST important to include in a contract with
a critical service provider to help ensure alignment with the
organization’s information security program?
A. Escalation paths
B. Termination language
C. Key performance indicators (KPIs)
D. Right-to-audit clause
Selected Answer: D
Question #: 763
Topic #: 1
Which of the following is the MOST important criterion when deciding
whether to accept residual risk?
https://awslagi.com/course/cism/lessons/cism-topic-1/ 26/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: C
Question #: 334
Topic #: 1
An organization recently activated its business continuity plan (BCP).
All employees were notified during the event, but some did not fully
follow the communications plan. What is the BEST way to prevent a
recurrence?
Selected Answer: A
Question #: 559
Topic #: 1
A common drawback of email software packages that provide native
encryption of messages is that the encryption:
Selected Answer: B
Question #: 536
Topic #: 1
Which of the following is the MOST important consideration for a
global organization that is designing an information security
awareness program?
A. National regulations
B. Program costs
C. Cultural backgrounds
D. Local languages
Selected Answer: C
https://awslagi.com/course/cism/lessons/cism-topic-1/ 27/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 517
Topic #: 1
How does an organization’s information security steering committee
facilitate the achievement of information security program objectives?
Selected Answer: B
Question #: 1155
Topic #: 1
An information security team has confirmed that threat actors are
taking advantage of a newly announced critical vulnerability within an
application. Which of the following should be done FIRST?
Selected Answer: A
Question #: 1152
Topic #: 1
The resilience requirements of an application are BEST determined by:
A. a cost-benefit analysis.
B. a threat assessment.
C. a business impact analysis (BIA).
D. a risk assessment.
Selected Answer: B
Question #: 682
Topic #: 1
In an organization with a rapidly changing environment, business
management has accepted an information security risk. It is MOST
important for the information security manager to ensure:
https://awslagi.com/course/cism/lessons/cism-topic-1/ 28/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: C
Question #: 306
Topic #: 1
Senior management has launched an enterprise-wide initiative to
streamline internal processes to reduce costs, including security
processes. What should the information security manager rely on
MOST to allocate resources efficiently?
Selected Answer: B
Question #: 138
Topic #: 1
The PRIMARY advantage of single sign-on (SSO) is that it will:
Selected Answer: C
Question #: 135
Topic #: 1
In an organization that has several independent security tools
including intrusion detection systems (IDSs) and firewalls, which of
the following is the BEST way to ensure timely detection of incidents?
https://awslagi.com/course/cism/lessons/cism-topic-1/ 29/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: A
Question #: 128
Topic #: 1
Which of the following is the MOST important reason for performing a
cost-benefit analysis when implementing a security control?
A. To ensure that the mitigation effort does not exceed the asset value
B. To ensure that benefits are aligned with business strategies
C. To present a realistic information security budget
D. To justify information security program activities
Selected Answer: B
Question #: 114
Topic #: 1
Which of the following functions is MOST critical when initiating the
removal of system access for terminated employees?
A. Help desk
B. Legal
C. Information security
D. Human resources (HR)
Selected Answer: D
Question #: 96
Topic #: 1
An information security manager has identified a major security event
with potential noncompliance implications. Who should be notified
FIRST?
A. Internal audit
B. Public relations team
C. Senior management
D. Regulatory authorities
Selected Answer: C
https://awslagi.com/course/cism/lessons/cism-topic-1/ 30/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 300
Topic #: 1
An organization wants to ensure its confidential data is isolated in a
multi-tenanted environment at a well-known cloud service provider.
Which of the following is the BEST way to ensure the data is adequately
protected?
Selected Answer: D
Question #: 299
Topic #: 1
A new regulatory requirement affecting an organization’s information
security program is released. Which of the following should be the
information security manager’s FIRST course of action?
A. Conduct benchmarking
B. Perform a gap analysis
C. Notify the legal department
D. Determine the disruption to the business
Selected Answer: C
Question #: 71
Topic #: 1
When monitoring the security of a web-based application, which of the
following is MOST frequently reviewed?
A. Audit reports
B. Access logs
C. Access lists
D. Threat metrics
Selected Answer: B
Question #: 1167
Topic #: 1
https://awslagi.com/course/cism/lessons/cism-topic-1/ 31/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: A
Question #: 1162
Topic #: 1
Which of the following presents the GREATEST challenge when
assessing the impact of emerging risk?
Selected Answer: B
Question #: 1161
Topic #: 1
What is the MOST important consideration when establishing metrics
for reporting to the information security strategy committee?
Selected Answer: B
Question #: 1159
Topic #: 1
When determining key risk indicators (KRIs) for use in an information
security program it is MOST important to select:
https://awslagi.com/course/cism/lessons/cism-topic-1/ 32/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: B
Question #: 45
Topic #: 1
Which of the following BEST protects against phishing attacks?
Selected Answer: B
Question #: 1055
Topic #: 1
Which of the following is MOST important to consider when choosing a
shared alternate location for computing facilities?
Selected Answer: D
Question #: 263
Topic #: 1
Who should an information security manager contact FIRST upon
discovering that a cloud-based payment system used by the
organization may be infected with malware?
A. Senior management
B. Affected customers
C. Cloud service provider
D. The incident response team
https://awslagi.com/course/cism/lessons/cism-topic-1/ 33/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: D
Question #: 1160
Topic #: 1
Senior management has requested a budget cut for the information
security program in the coming fiscal year. Which of the following
should be the information security manager’s FIRST course of action?
Selected Answer: A
Question #: 1132
Topic #: 1
An organization experienced a loss of revenue during a recent disaster.
Which of the following would BEST prepare the organization to
recover?
Selected Answer: D
Question #: 1098
Topic #: 1
Following a breach where the risk has been isolated and forensic
processes have been performed, which of the following should be done
NEXT?
Selected Answer: D
https://awslagi.com/course/cism/lessons/cism-topic-1/ 34/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 1119
Topic #: 1
Management would like to understand the risk associated with
engaging an Infrastructure-as-a-Service (IaaS) provider compared to
hosting internally. Which of the following would provide the BEST
method of comparing risk scenarios?
Selected Answer: B
Question #: 914
Topic #: 1
Of the following, who is MOST appropriate to own the risk associated
with the failure of a privileged access control?
A. Data owner
B. Information security manager
C. Business owner
D. Compliance manager
Selected Answer: C
Question #: 1107
Topic #: 1
Which of the following is the MOST effective way to ensure the security
of services and solutions delivered by third-party vendors?
Selected Answer: D
https://awslagi.com/course/cism/lessons/cism-topic-1/ 35/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 343
Topic #: 1
Which of the following is the MOST effective way to detect information
security incidents?
Selected Answer: D
Question #: 900
Topic #: 1
Which of the following should be done FIRST when developing an
information security strategy?
Selected Answer: A
Question #: 1041
Topic #: 1
Which of the following approaches to communication with senior
management BEST enables an information security manager to
maximize the effectiveness of the information security program?
Selected Answer: A
https://awslagi.com/course/cism/lessons/cism-topic-1/ 36/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 1039
Topic #: 1
Which of the following is MOST important to include in an information
security framework?
Selected Answer: D
Question #: 1004
Topic #: 1
Which of the following parameters is MOST helpful when designing a
disaster recovery strategy?
Selected Answer: A
Question #: 956
Topic #: 1
Which of the following is the FIRST step when conducting a post-
incident review?
Selected Answer: C
Question #: 1009
Topic #: 1
Which of the following processes should be done NEXT after
completing a business impact analysis (BIA)?
https://awslagi.com/course/cism/lessons/cism-topic-1/ 37/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: C
Question #: 984
Topic #: 1
Which of the following would BEST support a business case to
implement an anti-ransomware solution?
Selected Answer: C
Question #: 963
Topic #: 1
Which of the following is MOST important to maintain integration
among the incident response plan, business continuity plan (BCP), and
disaster recovery plan (DRP)?
A. Asset classification
B. Recovery time objectives (RTOs)
C. Chain of custody
D. Escalation procedures
Selected Answer: D
Question #: 940
Topic #: 1
Management of a financial institution accepted an operational risk that
consequently led to the temporary deactivation of a critical monitoring
process. Which of the following should be the information security
manager’s GREATEST concern with this situation?
https://awslagi.com/course/cism/lessons/cism-topic-1/ 38/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: D
Question #: 933
Topic #: 1
Which of the following metrics would BEST monitor how well
information security requirements are incorporated into the change
management process?
Selected Answer: C
Question #: 917
Topic #: 1
Which of the following BEST enables an organization to maintain an
appropriate security control environment?
Selected Answer: D
Question #: 303
Topic #: 1
To prevent ransomware attacks, it is MOST important to ensure:
Selected Answer: B
https://awslagi.com/course/cism/lessons/cism-topic-1/ 39/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 792
Topic #: 1
An organization recently purchased data loss prevention (DLP)
software but soon discovered the software fails to detect or prevent
data loss.
Selected Answer: C
Question #: 899
Topic #: 1
Which of the following roles is PRIMARILY responsible for developing
an information classification framework based on business needs?
A. Information owner
B. Information security steering committee
C. Senior management
D. Information security manager
Selected Answer: C
Question #: 879
Topic #: 1
Which of the following would BEST guide the development and
maintenance of an information security program?
Selected Answer: D
Question #: 855
Topic #: 1
https://awslagi.com/course/cism/lessons/cism-topic-1/ 40/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: D
Question #: 198
Topic #: 1
Which of the following is MOST likely to affect an organization’s ability
to respond to security incidents in a timely manner?
Selected Answer: A
Question #: 643
Topic #: 1
An organization is creating a risk mitigation plan that considers
redundant power supplies to reduce the business risk associated with
critical system outages. Which type of control is being considered?
A. Deterrent
B. Detective
C. Preventive
D. Corrective
Selected Answer: D
Question #: 446
Topic #: 1
Which of the following is MOST important to the effectiveness of an
information security program?
https://awslagi.com/course/cism/lessons/cism-topic-1/ 41/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: B
Question #: 839
Topic #: 1
Which of the following parties should be responsible for determining
access levels to an application that processes client information?
Selected Answer: A
Question #: 127
Topic #: 1
Which of the following is the MOST important objective of testing a
security incident response plan?
Selected Answer: A
Question #: 422
Topic #: 1
Which of the following is the BEST way to reduce the risk associated
with a successful social engineering attack targeting help desk staff?
Selected Answer: B
https://awslagi.com/course/cism/lessons/cism-topic-1/ 42/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Question #: 247
Topic #: 1
Which of the following is an information security manager’s FIRST
priority after a high-profile system has been compromised?
Selected Answer: D
Question #: 242
Topic #: 1
An organization has decided to outsource its disaster recovery function.
Which of the following is the MOST important consideration when
drafting the service level agreement (SLA)?
A. Testing requirements
B. Authorization chain
C. Recovery time objectives (RTOs)
D. Recovery point objectives (RPOs)
Selected Answer: A
Question #: 237
Topic #: 1
Which type of control is an incident response team?
A. Detective
B. Directive
C. Corrective
D. Preventive
Selected Answer: A
Question #: 106
Topic #: 1
Which of the following is the BEST way for an information security
manager to justify ongoing annual maintenance fees associated with an
intrusion prevention system (IPS)?
https://awslagi.com/course/cism/lessons/cism-topic-1/ 43/44
11/27/24, 5:42 PM CISM: Certified Information Security Manager → CISM Topic 1 - awslagi.com
Selected Answer: C
Question #: 105
Topic #: 1
Which of the following is MOST important when selecting an
information security metric?
Selected Answer: B
Next
https://awslagi.com/course/cism/lessons/cism-topic-1/ 44/44