CISM Online Practice Questions

Home / ISACA / CISM

Latest CISM Exam Practice Questions

The practice questions for CISM exam was last updated on 2025-09-15 .

Viewing page 1 out of 67 pages.

Viewing questions 1 out of 338 questions.

Question#1

An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster.
Which of the following metrics should be in the business continuity plan (BCP) to manage this requirement?

A. Maximum tolerable downtime (MTD)
B. Service level agreement (SLA)
C. Recovery point objective (RPO)
D. Recovery time objective (RTO)

Explanation:
The Recovery Time Objective (RTO) defines the maximum acceptable downtime for a business function or system following a disruption. If the organization requires recovery in 30 minutes, that is the system’s RTO.
This metric guides the selection of technologies, staffing, and procedures needed to meet recovery expectations.
“RTO defines the target time set for the recovery of IT and business activities after a disruption. It is a key BCP design parameter.”
― CISM Review Manual 15th Edition, Chapter 3: Business Continuity and Disaster Recovery Planning*

Question#2

Which of the following is MOST important to include in an information security strategy?

A. Stakeholder requirements
B. Risk register
C. Industry benchmarks
D. Regulatory requirements

Explanation:
Stakeholder requirements are the most important to include in an information security strategy, as they reflect the business needs, objectives, and expectations of the organization and its key stakeholders. Stakeholder requirements also help to align the information security strategy with the enterprise governance and the organizational culture. Risk register, industry benchmarks, and regulatory requirements are important inputs for the information security strategy, but they are not the most important to include.
Reference = CISM Review Manual 2022, page 321; CISM Exam Content Outline, Domain 1, Task 1.12

Question#3

Which of the following documents should contain the INITIAL prioritization of recovery of services?

A. IT risk analysis
B. Threat assessment
C. Business impact analysis (BIA)
D. Business process map

Explanation:
A business impact analysis (BIA) is the document that should contain the initial prioritization of recovery of services. A BIA is a process of identifying and analyzing the potential effects of disruptions to critical business functions and processes.
A BIA typically includes the following steps1:
• Identifying the critical business functions and processes that support the organization’s mission and objectives.
• Estimating the maximum tolerable downtime (MTD) for each function or process, which is the longest time that the organization can afford to be without that function or process before suffering unacceptable consequences.
• Assessing the potential impacts of disruptions to each function or process, such as financial losses, reputational damage, legal liabilities, regulatory penalties, customer dissatisfaction, etc.
• Prioritizing the recovery of functions or processes based on their MTDs and impacts, and assigning recovery time objectives (RTOs) and recovery point objectives (RPOs) for each function or process. RTOs are the target times for restoring functions or processes after a disruption, while RPOs are the acceptable amounts of data loss in case of a disruption.
• Identifying the resources and dependencies required for each function or process, such as staff, equipment, software, data, suppliers, customers, etc.
A BIA provides the basis for developing a business continuity plan (BCP), which is a document that outlines the strategies and procedures for ensuring the continuity or recovery of critical business functions and processes in the event of a disruption2. The other options are not documents that
should contain the initial prioritization of recovery of services. An IT risk analysis is a process of identifying and evaluating the threats and vulnerabilities that affect the IT systems and assets of an organization. It helps to determine the likelihood and impact of potential IT incidents, and to select and implement appropriate controls to mitigate the risks3. A threat assessment is a process of identifying and analyzing the sources and capabilities of adversaries that may pose a threat to an organization’s security. It helps to determine the level of threat posed by different actors, and to develop countermeasures to prevent or respond to attacks. A business process map is a visual representation of the activities, inputs, outputs, roles, and resources involved in a business process. It helps to understand how a process works, how it can be improved, and how it relates to other processes.
Reference: 1: Business impact analysis (BIA) - Wikipedia 2: Business continuity plan - Wikipedia 3: IT risk management - Wikipedia: Threat assessment - Wikipedia: Business process map-ping - Wikipedia

Question#4

Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?

A. Business impact analysis (BIA)
B. Risk register
C. Penetration testing
D. Vulnerability assessment

Explanation:
A risk register is a document that records and tracks the information security risks facing an organization, such as their sources, impacts, likelihoods, responses, and statuses. A risk register provides the most comprehensive insight into ongoing threats facing an organization, as it covers both internal and external threats, as well as their current and potential effects on the organization’s assets, processes, and objectives. A risk register also helps to prioritize and monitor the risk mitigation actions and controls, and to communicate the risk information to relevant stakeholders. Therefore, option B is the most appropriate answer.
Option A is not the best answer because a business impact analysis (BIA) is a process that identifies and evaluates the critical business functions, assets, and dependencies of an organization, and assesses their potential impact in the event of a disruption or loss. A BIA does not provide a comprehensive insight into ongoing threats facing an organization, as it focuses more on the consequences of the threats, rather than their sources, likelihoods, or responses. A BIA is mainly used to support the business continuity and disaster recovery planning, rather than the information security risk management.
Option C is not the best answer because penetration testing is a method of simulating a malicious attack on an organization’s IT systems or networks, to evaluate their security posture and identify any vulnerabilities or weaknesses that could be exploited by real attackers. Penetration testing does not provide a comprehensive insight into ongoing threats facing an organization, as it only covers a
specific scope, target, and scenario, rather than the whole range of threats, sources, and impacts. Penetration testing is mainly used to validate and improve the technical security controls, rather than the information security risk management.
Option D is not the best answer because vulnerability assessment is a process of scanning and analyzing an organization’s IT systems or networks, to detect and report any flaws or gaps that could pose a security risk. Vulnerability assessment does not provide a comprehensive insight into ongoing threats facing an organization, as it only covers the technical aspects of the threats, rather than their business, legal, or regulatory implications. Vulnerability assessment is mainly used to identify and remediate the security weaknesses, rather than the information security risk management.
Reference = CISM Review Manual 15th Edition1, pages 258-259; CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, QID 306.
A risk register provides the MOST comprehensive insight into ongoing threats facing an organization. This is because a risk register is a document that records and tracks the identified risks, their likelihood, impact, mitigation strategies, and status. A risk register helps an organization to monitor and manage the threats that could affect its objectives, assets, and operations. A risk register also helps an organization to prioritize its response efforts and allocate its resources accordingly.

Question#5

Which of the following is the BEST evidence of alignment between corporate and information security governance?

A. Security key performance indicators (KPIs)
B. Project resource optimization
C. Regular security policy reviews
D. Senior management sponsorship

Explanation:
Alignment between corporate and information security governance means that the information security program supports the organizational goals and objectives, and is integrated into the enterprise governance structure. The best evidence of alignment is the senior management sponsorship, which demonstrates the commitment and support of the top-level executives and board members for the information security program. Senior management sponsorship also ensures that the information security program has adequate resources, authority, and accountability to achieve its objectives and address the risks and issues that affect the organization. Senior management sponsorship also helps to establish a culture of security awareness and compliance throughout the organization, and to communicate the value and benefits of the information security program to the stakeholders.
Reference =
CISM Review Manual 15th Edition, page 1631
CISM 2020: Information Security & Business Process Alignment, video 22 Certified Information Security Manager (CISM), page 33

Exam Code: CISMQ & A: 966 Q&AsUpdated:  2025-09-15

 Get All CISM Q&As