Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 33

Mary Smith

Wed, 19 Nov 2025

CISM—Certified Information Security Manager - Part 33

1. Which of the following is the MOST effective way of ensuring that business units comply with an information security governance framework?

A) Integrating security requirements with processes
B) Performing security assessments and gap analysis
C) Conducting a business impact analysis (BIA)
D) Conducting information security awareness training



2. Which of the following BEST demonstrates alignment between information security governance and corporate governance?

A) Average number of security incidents across business units
B) Security project justifications provided in terms of business value
C) Number of vulnerabilities identified for high-risk information assets
D) Mean time to resolution for enterprise-wide security incidents



3. The MOST important element in achieving executive commitment to an information security governance program is:

A) a defined security framework
B) identified business drivers
C) established security strategies
D) a process improvement model



4. After implementing an information security governance framework, which of the following would provide the BEST information to develop an information security project plan?

A) Risk heat map
B) Recent audit results
C) Balanced scorecard
D) Gap analysis



5. An information security manager's PRIMARY objective for presenting key risks to the board of directors is to:

A) meet information security compliance requirements.
B) ensure appropriate information security governance.
C) quantity reputational risks.
D) re-evaluate the risk appetite.



1. Right Answer: B
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: B
Explanation:

0 Comments

Leave a comment