ISACA CISM Exam Questions
Certified Information Security Manager (Page 41 )

Updated On: 19-Feb-2026

The PRIMARY purpose of implementing information security governance metrics is to:

  1. measure alignment with best practices.
  2. assess operational and program metrics.
  3. refine control operations,
  4. guide security towards the desired state.

Answer(s): D



Which of the following MOST effectively helps an organization to align information security governance with corporate governance?

  1. Promoting security as enabler to achieve business objectives
  2. Prioritizing security initiatives based on IT strategy
  3. Adopting global security standards to achieve business goals
  4. Developing security performance metrics

Answer(s): A



Which of the following is MOST helpful for aligning security operations with the IT governance framework?

  1. Information security policy
  2. Security risk assessment
  3. Security operations program
  4. Business impact analysis (BIA)

Answer(s): A



Which of the following is the BEST approach for an information security manager to effectively manage third- party risk?

  1. Ensure controls are implemented to address changes in risk.
  2. Ensure senior management has approved the vendor relationship.
  3. Ensure risk management efforts are commensurate with risk exposure.
  4. Ensure vendor governance controls are in place.

Answer(s): D



When trying to integrate information security across an organization, the MOST important goal for a governing body should be to ensure:

  1. the resources used for information security projects are kept to a minimum.
  2. information security is treated as a business critical issue.
  3. funding is approved for requested information security projects.
  4. periodic information security audits are conducted.

Answer(s): B






Post your Comments and Discuss ISACA CISM exam dumps with other Community members:

Join the CISM Discussion