CISM – 6 Practice Questions and Answers (100% Pass)
A. Validation checks are missing in data input pages. - Answer✔️✔️-ID.Which of
the following vulnerabilities allowing attackers access to the application database
is the MOST serious?
A. Validation checks are missing in data input pages.
B. Password rules do not allow sufficient complexity.
C. Application transaction log management is weak.
D. Application and database share a single access
B. Encryption of stored data - Answer✔️✔️-Which of the following is the MOST
effective security measure to protect data held on mobile computing devices?
A.Biometric access control
1
,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
B. Encryption of stored data
C.Power-on passwords
D. Protection of data being transmitted
D. the threats and vulnerabilities - Answer✔️✔️-With regard to the implementation
of security awareness programs in an organization, it is MOST relevant to
understand that one of the following aspects can change?
A. The security culture
B. The information technology
C. The compliance requirements
2
,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
D. the threats and vulnerabilities
D. the data owner - Answer✔️✔️-Who is in the BEST position to determine the level
of information security needed for a specific business application?
A.The system developer
B. The information security manager
C. The system custodian
D. the data owner
B.Employ packet filtering to drop suspect packets. - Answer✔️✔️-What is the BEST
method for mitigating against network denial-of-service (DoS) attacks?
A.Ensure all servers are up-to-date on OS patches.
3
, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
B.Employ packet filtering to drop suspect packets.
C. Implement network address translation to make internal addresses nonroutable.
D. Implement load balancing for Internet facing devices.
D. Reduces financial risk but leaves legal responsibility generally unchanged. -
Answer✔️✔️-Outsourcing combined with indemnification:
A.reduces legal responsibility but leaves financial risk relatively unchanged.
B.Is more cost-effective as a means of risk transfer than purchasing insurance.
C.Eliminates the reputational risk present when operations remain in-house.
D. Reduces financial risk but leaves legal responsibility generally unchanged.
B. Preserving the integrity of the evidence - Answer✔️✔️-What is the PRIMARY
focus if an organization considers taking legal action on a security incident?
4