New Year Special 75% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 75brite

Isaca Updated CISM Exam Questions and Answers by camille

Page: 22 / 72

Isaca CISM Exam Overview :

Exam Name: Certified Information Security Manager
Exam Code: CISM Dumps
Vendor: Isaca Certification: Isaca Certification
Questions: 967 Q&A's Shared By: camille
Question 88

Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:

Options:

A.

a function of the likelihood and impact, should a threat exploit a vulnerability.

B.

the magnitude of the impact, should a threat exploit a vulnerability.

C.

a function of the cost and effectiveness of controls over a vulnerability.

D.

the likelihood of a given threat attempting to exploit a vulnerability

Discussion
Melody
My experience with Cramkey was great! I was surprised to see that many of the questions in my exam appeared in the Cramkey dumps.
Colby Dec 6, 2025
Yes, In fact, I got a score of above 85%. And I attribute a lot of my success to Cramkey's dumps.
Annabel
I recently used them for my exam and I passed it with excellent score. I am impressed.
Amirah Dec 3, 2025
I passed too. The questions I saw in the actual exam were exactly the same as the ones in the Cramkey Dumps. I was able to answer the questions confidently because I had already seen and studied them.
Cecilia
Yes, I passed my certification exam using Cramkey Dumps.
Helena Dec 19, 2025
Great. Yes they are really effective
Wyatt
Passed my exam… Thank you so much for your excellent Exam Dumps.
Arjun Dec 21, 2025
That sounds really useful. I'll definitely check it out.
Ella-Rose
Amazing website with excellent Dumps. I passed my exam and secured excellent marks!!!
Alisha Dec 15, 2025
Extremely accurate. They constantly update their materials with the latest exam questions and answers, so you can be confident that what you're studying is up-to-date.
Question 89

Data classification is PRIMARILY the responsibility of:

Options:

A.

senior management.

B.

the data custodian.

C.

the data owner.

D.

the security manager.

Discussion
Question 90

Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?

Options:

A.

Block IP addresses used by the attacker

B.

Redirect the attacker's traffic

C.

Disable firewall ports exploited by the attacker.

D.

Power off affected servers

Discussion
Question 91

When investigating an information security incident, details of the incident should be shared:

Options:

A.

widely to demonstrate positive intent.

B.

only with management.

C.

only as needed,

D.

only with internal audit.

Discussion
Page: 22 / 72
Title
Questions
Posted

CISM
PDF

$49.75  $199

CISM Testing Engine

$56.25  $225

CISM PDF + Testing Engine

$62.25  $249