ISACA CISM Exam Questions
Certified Information Security Manager (Page 67 )

Updated On: 21-Feb-2026

Which of the following vulnerabilities presents the GREATEST risk of external hackers gaining access to the corporate network?

  1. Internal hosts running unnecessary services
  2. Inadequate logging
  3. Excessive administrative rights to an internal database
  4. Missing patches on a workstation

Answer(s): C



An information security manager has developed a strategy to address new information security risks resulting from recent changes in the business. Which of the following would be MOST important to include when presenting the strategy to senior management?

  1. The costs associated with business process changes
  2. Results of benchmarking against industry peers
  3. The impact of organizational changes on the security risk profile
  4. Security controls needed for risk mitigation

Answer(s): C



What is the BEST way to determine the level of risk associated with information assets processed by an IT application?

  1. Evaluate the potential value of information for an attacker
  2. Calculate the business value of the information assets
  3. Review the cost of acquiring the information assets for the business
  4. Research compliance requirements associated with the information

Answer(s): B



When the inherent risk of a business activity is lower than the acceptable risk level, the BEST course of action would be to:

  1. monitor for business changes
  2. review the residual risk level
  3. report compliance to management
  4. implement controls to mitigate the risk

Answer(s): B



Which of the following would be MOST useful in a report to senior management for evaluating changes in the organization’s information security risk position?

  1. Risk register
  2. Trend analysis
  3. Industry benchmarks
  4. Management action plan

Answer(s): A






Post your Comments and Discuss ISACA CISM exam dumps with other Community members:

Join the CISM Discussion