ISACA CISM Exam Questions
Certified Information Security Manager (Page 11 )

Updated On: 17-Feb-2026

Information security projects should be prioritized on the basis of:

  1. time required for implementation.
  2. impact on the organization.
  3. total cost for implementation.
  4. mix of resources required.

Answer(s): B

Explanation:

Information security projects should be assessed on the basis of the positive impact that they will have on the organization. Time, cost and resource issues should be subordinate to this objective.



Which of the following is the MOST important information to include in an information security standard?

  1. Creation date
  2. Author name
  3. Initial draft approval date
  4. Last review date

Answer(s): D

Explanation:

The last review date confirms the currency of the standard, affirming that management has reviewed the standard to assure that nothing in the environment has changed that would necessitate an update to the standard. The name of the author as well as the creation and draft dates are not that important.



Which of the following would BEST prepare an information security manager for regulatory reviews?

  1. Assign an information security administrator as regulatory liaison
  2. Perform self-assessments using regulatory guidelines and reports
  3. Assess previous regulatory reports with process owners input
  4. Ensure all regulatory inquiries are sanctioned by the legal department

Answer(s): B

Explanation:

Self-assessments provide the best feedback on readiness and permit identification of items requiring remediation. Directing regulators to a specific person or department, or assessing previous reports, is not as effective. The legal department should review all formal inquiries but this does not help prepare for a regulatory review.



An information security manager at a global organization that is subject to regulation by multiple governmental jurisdictions with differing requirements should:

  1. bring all locations into conformity with the aggregate requirements of all governmental jurisdictions.
  2. establish baseline standards for all locations and add supplemental standards as required.
  3. bring all locations into conformity with a generally accepted set of industry best practices.
  4. establish a baseline standard incorporating those requirements that all jurisdictions have in common.

Answer(s): B

Explanation:

It is more efficient to establish a baseline standard and then develop additional standards for locations that must meet specific requirements. Seeking a lowest common denominator or just using industry best practices may cause certain locations to fail regulatory compliance. The opposite approach—forcing all locations to be in compliance with the regulations places an undue burden on those locations.



Which of the following BEST describes an information security manager's role in a multidisciplinary team that will address a new regulatory requirement regarding operational risk?

  1. Ensure that all IT risks are identified
  2. Evaluate the impact of information security risks
  3. Demonstrate that IT mitigating controls are in place
  4. Suggest new IT controls to mitigate operational risk

Answer(s): B

Explanation:

The job of the information security officer on such a team is to assess the risks to the business operation. Choice A is incorrect because information security is not limited to IT issues. Choice C is incorrect because at the time a team is formed to assess risk, it is premature to assume that any demonstration of IT controls will mitigate business operations risk. Choice D is incorrect because it is premature at the time of the formation of the team to assume that any suggestion of new IT controls will mitigate business operational risk.






Post your Comments and Discuss ISACA CISM exam dumps with other Community members:

Join the CISM Discussion