| Exam Code/Number: | CISMJoin the discussion |
| Exam Name: | Certified Information Security Manager |
| Certification: | ISACA |
| Question Number: | 1025 |
| Publish Date: | Jan 11, 2026 |
|
Rating
100%
|
|
A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
An information security manager learns that an existing supplier plans to begin using its recently developed generative AI technology for the same scope of service. A risk assessment was performed on the supplier three months ago with no outstanding findings. Which of the following is the BEST course of action to address the associated risk?
Which of the following should be the MOST important consideration of business continuity management?
Which of the following is the BEST justification for making a revision to a password policy?
Jul 07, 2025
Apr 04, 2023
Mar 13, 2023
Jan 28, 2023
Feb 28, 2022