Exam CISM: Certified Information Security Manager
Exam Number: CISM | Length of test: 4 hours |
Exam Name: Certified Information Security Manager | Number of questions in the actual exam: 150 |
Format: PDF, VPLUS | Passing Score: 450/800 |
Total Questions: 801
FREE
Premium VPLUS file
Last updated: March-2025
Download practice test questions
Title | Size | Hits | Download |
---|---|---|---|
Isaca.CISM.vJan-2025.by.Andoolo.237q | 1.02 MB | 24 | Download |
Isaca.CISM.vJan-2025.by.Andoolo.237q | 96.97 KB | 22 | Download |
Isaca.CISM.vMay-2024.by.Ethan.225q | 1.00 MB | 89 | Download |
Isaca.CISM.vJun-2023.by.Smithy.93q | 216.62 KB | 75 | Download |
Isaca.marina.CISM.vMay-2023.by.SPmarina.127q | 251.70 KB | 86 | Download |
Some new sample questions:
Question:
An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?
A. The number of blocked external attacks is not representative of the true threat profile.
B. The number of blocked external attacks will vary by month, causing inconsistent graphs.
C. The number of blocked external attacks is an indicator of the organization’s popularity.
D. The number of blocked external attacks over time does not explain the attackers’ motivations.
Question:
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
A. Threat analytics software
B. Host intrusion detection system
C. SIEM
D. Network intrusion detection system
Question:
Which of the following would be MOST important to include in a proposal justifying investments for an organization’s information security program?
A. Vulnerability scan results
B. Competitor benchmark analysis
C. Previous security budget
D. Business requirements
Question:
Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?
A. Demonstrate the effectiveness of business continuity plans (BCPs).
B. Report key performance indicator (KPI) trends.
C. Demonstrate that the program enables business activities.
D. Provide evidence of increased security events at peer organizations.
…….