Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Examen

CISM Exam Test Questions With 100% Verified Solutions

Note
-
Vendu
-
Pages
27
Grade
A+
Publié le
26-05-2025
Écrit en
2024/2025

CISM Exam Test Questions With 100% Verified Solutions 1. Which of the following BEST indicates the probability that a successful attack will occur? A. Value of the target and level of protection is high B. Motivation and ability of the attacker is high C. Value of the target is high and protection is low D. Motivation of the attacker and value of the target is high - ANSWER- Value of the target is high and protection is low 2. The results of an organizational risk analysis should FIRST be shared with: A. external auditors. B. stockholders. C. senior management. D. peer organizations. - ANSWER- senior management 3. The GREATEST reduction in overhead costs for security administration would be provided by: A. mandatory access control. B. role-based access control. C. decentralized access control. D. discretionary access control. - ANSWER- role-based access control 4. The BEST reason for an organization to have two discrete firewalls connected directly to the Internet and to the same DMZ would be to: A. provide defense in-depth. B. separate test and production. C. permit traffic load balancing. D. prevent a denial-of-service attack. - ANSWER- permit traffic load balancing 5. Accountability by business process owners can BEST be obtained through: A. periodic reminder memorandums. B. strict enforcement of policies. C. policies signed by IT management. D. education and awareness meetings. - ANSWER- education and awareness meetings 26. Which of the following is the BEST method for ensuring that security procedures and guidelines are read and understood? A. Periodic focus group meetings B. Periodic reminder memos to management C. Computer-based training (CBT) presentations D. Employees signing an acknowledgement of receipt - ANSWER- Computer-based training (CBT) presentations 8. Which of the following is the MOST effective solution for preventing internal users from modifying sensitive and classified information? A. Baseline security standards B. System access logs C. Role-based access controls D. Intrusion detection system - ANSWER- Role-based access controls 9. Which of the following devices should be placed within a DMZ? A. Network switch B. Web server C. Database server D. File/print server - ANSWER- Web server 10. Access to a sensitive intranet application by mobile users can BEST be accomplished through: A. data encryption. B. digital signatures. C. strong passwords. D. two-factor authentication. - ANSWER- two-factor authentication 11. An information security program should be sponsored by: A. infrastructure management. B. the corporate legal department. C. key business process owners. D. quality assurance management. - ANSWER- key business process owners 12. The BEST way to ensure that security settings on each platform are in compliance with information security policies and procedures is to: A. perform penetration testing. B. establish security baselines. C. implement vendor default settings. D. link policies to an independent standard. - ANSWER- establish security baselines 13. Which of the following will MOST likely reduce the likelihood of an unauthorized individual gaining access to computing resources by pretending to be an authorized individual needing to have their password reset? A. Performing reviews of password resets. B. Conducting security awareness programs. C. Increasing the frequency of password changes. D. Implementing automatic password syntax checking. - ANSWER- Conducting security awareness programs 14. Which of the following is the BEST indicator that security awareness training has been effective? A. Have employees sign to confirm they have read the security policy. B. More incidents are being reported. C. A majority of employees have received training. D. Feedback forms from training are favorable. - ANSWER- More incidents are being reported 15. Which of the following metrics would be the MOST useful in measuring how well information security is monitoring violation logs? The number of: A. penetration attempts investigated. B. violation log reports reviewed. C. violation log entries reviewed. D. hours charged to the review process. - ANSWER- penetration attempts investigated

Montrer plus Lire moins
Établissement
CISM
Cours
CISM










Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
CISM
Cours
CISM

Infos sur le Document

Publié le
26 mai 2025
Nombre de pages
27
Écrit en
2024/2025
Type
Examen
Contient
Questions et réponses

Sujets

Aperçu du contenu

CISM Exam Test Questions With 100% Verified
Solutions

1. Which of the following BEST indicates the probability that a successful attack will
occur?

A. Value of the target and level of protection is high
B. Motivation and ability of the attacker is high
C. Value of the target is high and protection is low
D. Motivation of the attacker and value of the target is high - ANSWER- Value of the
target is high and protection is low

2. The results of an organizational risk analysis should FIRST be shared with:

A. external
auditors.
B.
stockholders.
C. senior
management.
D. peer organizations. - ANSWER-
senior management

3. The GREATEST reduction in overhead costs for
security administration would be
provided by:

A. mandatory access control.
B. role-based access control.
C. decentralized access control. D. discretionary access control. - ANSWER- role-based
access control

4. The BEST reason for an organization to have two discrete firewalls connected
directly to the Internet and to the same DMZ would be to:

A. provide defense in-depth.
B. separate test and production.
C. permit traffic load balancing.
D. prevent a denial-of-service attack. - ANSWER- permit traffic load balancing

,5. Accountability by business process owners can BEST be obtained through:

A. periodic reminder memorandums.
B. strict enforcement of policies.
C. policies signed by IT management.
D. education and awareness meetings. - ANSWER- education and awareness meetings

26. Which of the following is the BEST method for ensuring that security procedures
and guidelines are read and understood?

A. Periodic focus group meetings
B. Periodic reminder memos to management
C. Computer-based training (CBT) presentations
D. Employees signing an acknowledgement of receipt - ANSWER- Computer-based
training (CBT) presentations

8. Which of the following is the MOST effective solution for preventing internal users
from modifying sensitive and classified information?

A. Baseline security standards
B. System access logs
C. Role-based access controls
D. Intrusion detection system - ANSWER- Role-based access controls

9. Which of the following devices should be placed within a DMZ?

A. Network switch
B. Web server
C. Database server
D. File/print server - ANSWER- Web server

10. Access to a sensitive intranet application by mobile users can BEST be
accomplished through:

A. data encryption.
B. digital signatures.
C. strong passwords.
D. two-factor authentication. - ANSWER- two-factor authentication

11. An information security program should be sponsored by:

A. infrastructure management.
B. the corporate legal department.

, C. key business process owners.
D. quality assurance management. - ANSWER- key business process owners

12. The BEST way to ensure that security settings on each platform are in compliance
with information security policies and procedures is to:

A. perform penetration testing.
B. establish security baselines.
C. implement vendor default settings.
D. link policies to an independent standard. - ANSWER- establish security baselines

13. Which of the following will MOST likely reduce the likelihood of an unauthorized
individual gaining access to computing resources by pretending to be an authorized
individual needing to have their password reset?

A. Performing reviews of password resets.
B. Conducting security awareness programs.
C. Increasing the frequency of password changes.
D. Implementing automatic password syntax checking. - ANSWER- Conducting security
awareness programs

14. Which of the following is the BEST indicator that security awareness training has
been effective?

A. Have employees sign to confirm they have read the security policy.
B. More incidents are being reported.
C. A majority of employees have received training.
D. Feedback forms from training are favorable. - ANSWER- More incidents are being
reported

15. Which of the following metrics would be the MOST useful in measuring how
well
information security is monitoring violation logs? The number
of:
A. penetration attempts
investigated.
B. violation log reports
reviewed.
C. violation log entries
reviewed.
D. hours charged to the review process. - ANSWER- penetration attempts
investigated
$14.99
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur
Seller avatar
TopGradeGuru
1.5
(2)

Document également disponible en groupe

Thumbnail
Package deal
CISM EXAM BUNDLE |Questions And Answers|Latest updates
-
8 2025
$ 119.92 Plus d'infos

Faites connaissance avec le vendeur

Seller avatar
TopGradeGuru Teachme2-tutor
Voir profil
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
10
Membre depuis
1 année
Nombre de followers
0
Documents
2429
Dernière vente
1 mois de cela
GRADEHUB

We provide access to a wide range of professionally curated exams for students and educators. It offers high-quality, up-to-date assessment materials tailored to various subjects and academic levels. With instant downloads and affordable pricing, it's the go-to resource for exam preparation and academic success.

1.5

2 revues

5
0
4
0
3
0
2
1
1
1

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions