Try 12 Certified Information Security Manager (CISM) sample questions and practice-test preview prompts on security governance, risk management, program development, incident management, and business alignment.
Certified Information Security Manager (CISM) is a management-focused information security credential. It emphasizes governance, program ownership, risk management, incident response, and alignment between security decisions and business objectives.
Use these 12 original sample questions for initial self-assessment. The full IT Mastery route for CISM is not available yet; try the preview and use the Notify me form if this is your target route.
CISM questions usually reward the management answer, not the deepest technical fix. Look for governance, risk ownership, business alignment, communication, and program-level control rather than jumping straight to a tool or configuration change.
These questions are original IT Mastery preview items for CISM security-management judgment. They are not official ISACA exam questions.
Topic: security governance
An information security manager is asked to justify a new security program to executives. What should be emphasized first?
Best answer: B
Explanation: CISM is management-oriented. A program should be justified by business risk, obligations, and measurable value, not by tool counts or technical detail alone.
Topic: risk ownership
A business unit accepts a high residual risk after reviewing treatment options. What is the security manager’s best role?
Best answer: D
Explanation: Business management owns risk decisions. Security management supports analysis, governance, documentation, and monitoring.
Topic: program development
A new security awareness program has low completion and no evidence of behavior change. What should the manager do?
Best answer: A
Explanation: Program management requires outcomes, not just activity. Completion rates, behavior indicators, audience relevance, and reinforcement all matter.
Topic: incident communication
A ransomware event may affect customer-facing systems. What should the security manager prioritize?
Best answer: C
Explanation: Incident management is cross-functional. Communication should be timely, coordinated, accurate, and aligned with escalation and legal obligations.
Topic: metrics
Which metric is most useful for security program oversight?
Best answer: D
Explanation: Management metrics should support decisions. Tool counts and meeting counts are weak unless tied to risk and performance outcomes.
Topic: policy management
A policy is approved but not followed because procedures and responsibilities are unclear. What is the best next step?
Best answer: B
Explanation: Policy governance includes implementation. Responsibilities, procedures, awareness, monitoring, and enforcement make the policy operational.
Topic: third-party security
A vendor handles sensitive customer data. What should the security manager ensure before onboarding?
Best answer: A
Explanation: Third-party security management includes due diligence, contracts, assurance, monitoring, and incident expectations. Vendor appearance is not enough.
Topic: security strategy
Executives want security investment prioritized for the next year. What should drive prioritization?
Best answer: C
Explanation: A security strategy should prioritize according to risk and business value. CISM candidates should avoid tool-first prioritization.
Topic: incident lessons learned
After a major incident, what is the most valuable management action?
Best answer: D
Explanation: Post-incident review converts response experience into program improvement. Corrective actions should be owned and tracked.
Topic: risk treatment
A critical application has a high-risk vulnerability, but immediate patching could disrupt operations. What should the security manager do?
Best answer: B
Explanation: Management decisions balance risk and operations. Treatment can include patching, compensating controls, scheduling, transfer, avoidance, or documented acceptance.
Topic: business alignment
A security control blocks a revenue-critical process and users are bypassing it. What is the best management response?
Best answer: A
Explanation: CISM emphasizes alignment. A control that drives bypass behavior may need redesign, process change, or better communication while still addressing risk.
Topic: security architecture oversight
A project team wants to launch a new cloud service without security review. What should the security manager require?
Best answer: C
Explanation: Security should be integrated into project governance and lifecycle processes. Late review increases risk and rework.
| Area | What to check |
|---|---|
| Governance | Tie security decisions to business objectives, accountability, and risk appetite. |
| Program management | Measure outcomes, not just security activity. |
| Incident response | Coordinate communication, escalation, evidence, and lessons learned. |
| Risk ownership | Keep risk decisions documented and owned by the right business authority. |