ISACA CISM Exam Questions
Certified Information Security Manager (Page 39 )

Updated On: 19-Feb-2026

Which of the following is the BEST approach for an information security manager when developing new information security policies?

  1. Create a stakeholder map.
  2. Reference an industry standard.
  3. Establish an information security governance committee.
  4. Download a policy template.

Answer(s): C



When supporting a large corporation’s board of directors in the development of governance, which of the following is the PRIMARY function of the information security manager?

  1. Gaining commitment of senior management
  2. Preparing the security budget
  3. Providing advice and guidance
  4. Developing a balanced scorecard

Answer(s): C



When making an outsourcing decision, which of the following functions is MOST important to retain within the organization?

  1. Security management
  2. Incident response
  3. Risk assessment
  4. Security governance

Answer(s): D



Which of the following would be MOST important to consider when implementing security settings for a new system?

  1. Results from internal and external audits
  2. Government regulations and related penalties
  3. Business objectives and related IT risk
  4. Industry best practices applicable to the business

Answer(s): C



The MOST important outcome of information security governance is:

  1. business risk avoidance.
  2. informed decision making.
  3. alignment with business goals.
  4. alignment with compliance requirements.

Answer(s): C






Post your Comments and Discuss ISACA CISM exam dumps with other Community members:

Join the CISM Discussion