ISACA CISM Exam Questions
Certified Information Security Manager (Page 38 )

Updated On: 19-Feb-2026

When an organization and its IT-hosting service provider are establishing a contract with each other, it is
MOST important that the contract includes:

  1. details of expected security metrics.
  2. each party’s security responsibilities.
  3. penalties for noncompliance with security policy.
  4. recovery time objectives (RTOs).

Answer(s): B

Explanation:

It's very important when organization start work with third party before signing the SLA negotiate the company current security needs and new security risk.



Which of the following would be MOST useful to help senior management understand the status of information security compliance?

  1. Industry benchmarks
  2. Risk assessment results
  3. Business impact analysis (BIA) results
  4. Key performance indicators (KPIs)

Answer(s): D



Which of the following is MOST likely to be included in an enterprise information security policy?

  1. Security monitoring strategy
  2. Audit trail review requirements
  3. Password composition requirements
  4. Consequences of noncompliance

Answer(s): D



Which of the following BEST demonstrates that an organization supports information security governance?

  1. Employees attend annual organization-wide security training.
  2. Information security policies are readily available to employees.
  3. The incident response plan is documented and tested regularly.
  4. Information security steering committee meetings are held regularly.

Answer(s): D



Which of the following should be the PRIMARY expectation of management when an organization introduces an information security governance framework?

  1. Optimized information security resources
  2. Consistent execution of information security strategy
  3. Improved accountability to shareholders
  4. Increased influence of security management

Answer(s): B






Post your Comments and Discuss ISACA CISM exam dumps with other Community members:

Join the CISM Discussion