CISM Domain 3 Practice Questions and Answers (100% Pass)
Which of the following devices should be placed within a DMZ? - Answer✔️✔️-
mail relay
An intrusion detection system should be placed: - Answer✔️✔️-on a screened subnet
The BEST reason for an organization to have two discrete firewalls connected
directly to the Internet and to the same DMZ would be to: - Answer✔️✔️-permit
traffic load balancing
On which of the following should a firewall be placed? - Answer✔️✔️-domain
boundary
Which of the following is the MOST effective solution for preventing individuals
external to the organization from modifying sensitive information on a corporate
database? - Answer✔️✔️-screened subnets
A border router should be placed on which of the following? - Answer✔️✔️-domain
boundary
1
, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
Which of the following is the MOST important consideration when securing
customer credit card data acquired by a point- of-sale (POS) cash register? -
Answer✔️✔️-encryption
Which of the following is the MOST important risk associated with middleware in
a client-server environment? - Answer✔️✔️-system integrity may be affected
Which of the following security mechanisms is MOST - Answer✔️✔️-
effective in protecting classified data that have been encrypted to prevent
disclosure and transmission outside the organization's network? -
Answer✔️✔️-safeguards over keys
In the process of deploying a new email system, an information security manager
would like to ensure the confidentiality of messages while in transit. Which of the
following is the MOST appropriate method to ensure data confidentiality in a new
email system implementation? - Answer✔️✔️-encryption
Which of the following features is normally missing when using Secure Sockets
Layer (SSL) in a web browser? - Answer✔️✔️-certificate-based authentication of
web client
A message that has been encrypted by the sender's private key and again by the
receiver's public key achieves: - Answer✔️✔️-confidentiality and nonrepudiation
2