ISACA CISM Exam Questions
Certified Information Security Manager (Page 36 )

Updated On: 19-Feb-2026

Which of the following is the MOST important requirement for the successful implementation of security governance?

  1. Implementing a security balanced scorecard
  2. Performing an enterprise-wide risk assessment
  3. Mapping to organizational strategies
  4. Aligning to an international security framework

Answer(s): C



A large organization is in the process of developing its information security program that involves working with several complex organizational functions. Which of the following will BEST enable the successful implementation of this program?

  1. Security governance
  2. Security policy
  3. Security metrics
  4. Security guidelines

Answer(s): A



Which of the following is a PRIMARY responsibility of an information security governance committee?

  1. Analyzing information security policy compliance reviews
  2. Approving the purchase of information security technologies
  3. Reviewing the information security strategy
  4. Approving the information security awareness training strategy

Answer(s): C



An information security manager discovers that the organization’s new information security policy is not being followed across all departments. Which of the following should be of GREATEST concern to the information security manager?

  1. Different communication methods may be required for each business unit.
  2. Business unit management has not emphasized the importance of the new policy.
  3. The corresponding controls are viewed as prohibitive to business operations.
  4. The wording of the policy is not tailored to the audience.

Answer(s): C



An organization has detected potential risk emerging from noncompliance with new regulations in its industry. Which of the following is the MOST important reason to report this situation to senior management?

  1. The risk profile needs to be updated.
  2. An external review of the risk needs to be conducted.
  3. Specific monitoring controls need to be implemented.
  4. A benchmark analysis needs to be performed.

Answer(s): A






Post your Comments and Discuss ISACA CISM exam dumps with other Community members:

Join the CISM Discussion