ISACA CISM Exam Questions
Certified Information Security Manager (Page 33 )

Updated On: 19-Feb-2026

Which of the following is the MOST important consideration for designing an effective information security governance framework?

  1. Defined security metrics
  2. Continuous audit cycle
  3. Security policy provisions
  4. Security controls automation

Answer(s): A



The PRIMARY goal of information security governance to an organization is to:

  1. align with business processes
  2. align with business objectives
  3. establish a security strategy
  4. manage security costs

Answer(s): B



Which of the following is the BEST way to integrate information security into corporate governance?

  1. Engage external security consultants in security initiatives.
  2. Conduct comprehensive information security management training for key stakeholders.
  3. Ensure information security processes are part of the existing management processes.
  4. Require periodic security risk assessments be performed.

Answer(s): C



Which of the following is the MOST effective way of ensuring that business units comply with an information security governance framework?

  1. Integrating security requirements with processes
  2. Performing security assessments and gap analysis
  3. Conducting a business impact analysis (BIA)
  4. Conducting information security awareness training

Answer(s): B



Which of the following BEST demonstrates alignment between information security governance and corporate governance?

  1. Average number of security incidents across business units
  2. Security project justifications provided in terms of business value
  3. Number of vulnerabilities identified for high-risk information assets
  4. Mean time to resolution for enterprise-wide security incidents

Answer(s): B






Post your Comments and Discuss ISACA CISM exam dumps with other Community members:

Join the CISM Discussion