ISACA CISM Exam Questions
Certified Information Security Manager (Page 40 )

Updated On: 19-Feb-2026

Senior management commitment and support will MOST likely be offered when the value of information security governance is presented from a:

  1. threat perspective.
  2. compliance perspective.
  3. risk perspective.
  4. policy perspective.

Answer(s): D



Within a security governance framework, which of the following is the MOST important characteristic of the information security committee? The committee:

  1. conducts frequent reviews of the security policy
  2. has established relationships with external professionals
  3. has a clearly defined charter and meeting protocols
  4. includes a mix of members from all levels of management

Answer(s): D



Which of the following is MOST important to the successful implementation of an information security governance framework across the organization?

  1. Organizational security controls deployed in line with regulations
  2. Security management processes aligned with security objectives
  3. The existing organizational security culture
  4. Security policies that adhere to industry best practices

Answer(s): B



Which of the following is the MOST effective way to achieve the integration of information security governance into corporate governance?

  1. Align information security budget requests to organizational goals
  2. Ensure information security efforts support business goals
  3. Provide periodic IT balanced scorecards to senior management
  4. Ensure information security aligns with IT strategy

Answer(s): A



To gain a clear understanding of the impact that a new regulatory requirement will have on an organization’s information security controls, an information security manager should FIRST:

  1. interview senior management
  2. conduct a risk assessment
  3. conduct a cost-benefit analysis
  4. perform a gap analysis

Answer(s): D






Post your Comments and Discuss ISACA CISM exam dumps with other Community members:

Join the CISM Discussion