100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CISM Exam Test Questions With 100% Verified Solutions

Rating
-
Sold
-
Pages
27
Grade
A+
Uploaded on
26-05-2025
Written in
2024/2025

CISM Exam Test Questions With 100% Verified Solutions 1. Which of the following BEST indicates the probability that a successful attack will occur? A. Value of the target and level of protection is high B. Motivation and ability of the attacker is high C. Value of the target is high and protection is low D. Motivation of the attacker and value of the target is high - ANSWER- Value of the target is high and protection is low 2. The results of an organizational risk analysis should FIRST be shared with: A. external auditors. B. stockholders. C. senior management. D. peer organizations. - ANSWER- senior management 3. The GREATEST reduction in overhead costs for security administration would be provided by: A. mandatory access control. B. role-based access control. C. decentralized access control. D. discretionary access control. - ANSWER- role-based access control 4. The BEST reason for an organization to have two discrete firewalls connected directly to the Internet and to the same DMZ would be to: A. provide defense in-depth. B. separate test and production. C. permit traffic load balancing. D. prevent a denial-of-service attack. - ANSWER- permit traffic load balancing 5. Accountability by business process owners can BEST be obtained through: A. periodic reminder memorandums. B. strict enforcement of policies. C. policies signed by IT management. D. education and awareness meetings. - ANSWER- education and awareness meetings 26. Which of the following is the BEST method for ensuring that security procedures and guidelines are read and understood? A. Periodic focus group meetings B. Periodic reminder memos to management C. Computer-based training (CBT) presentations D. Employees signing an acknowledgement of receipt - ANSWER- Computer-based training (CBT) presentations 8. Which of the following is the MOST effective solution for preventing internal users from modifying sensitive and classified information? A. Baseline security standards B. System access logs C. Role-based access controls D. Intrusion detection system - ANSWER- Role-based access controls 9. Which of the following devices should be placed within a DMZ? A. Network switch B. Web server C. Database server D. File/print server - ANSWER- Web server 10. Access to a sensitive intranet application by mobile users can BEST be accomplished through: A. data encryption. B. digital signatures. C. strong passwords. D. two-factor authentication. - ANSWER- two-factor authentication 11. An information security program should be sponsored by: A. infrastructure management. B. the corporate legal department. C. key business process owners. D. quality assurance management. - ANSWER- key business process owners 12. The BEST way to ensure that security settings on each platform are in compliance with information security policies and procedures is to: A. perform penetration testing. B. establish security baselines. C. implement vendor default settings. D. link policies to an independent standard. - ANSWER- establish security baselines 13. Which of the following will MOST likely reduce the likelihood of an unauthorized individual gaining access to computing resources by pretending to be an authorized individual needing to have their password reset? A. Performing reviews of password resets. B. Conducting security awareness programs. C. Increasing the frequency of password changes. D. Implementing automatic password syntax checking. - ANSWER- Conducting security awareness programs 14. Which of the following is the BEST indicator that security awareness training has been effective? A. Have employees sign to confirm they have read the security policy. B. More incidents are being reported. C. A majority of employees have received training. D. Feedback forms from training are favorable. - ANSWER- More incidents are being reported 15. Which of the following metrics would be the MOST useful in measuring how well information security is monitoring violation logs? The number of: A. penetration attempts investigated. B. violation log reports reviewed. C. violation log entries reviewed. D. hours charged to the review process. - ANSWER- penetration attempts investigated

Show more Read less
Institution
CISM
Course
CISM










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISM
Course
CISM

Document information

Uploaded on
May 26, 2025
Number of pages
27
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CISM Exam Test Questions With 100% Verified
Solutions

1. Which of the following BEST indicates the probability that a successful attack will
occur?

A. Value of the target and level of protection is high
B. Motivation and ability of the attacker is high
C. Value of the target is high and protection is low
D. Motivation of the attacker and value of the target is high - ANSWER- Value of the
target is high and protection is low

2. The results of an organizational risk analysis should FIRST be shared with:

A. external
auditors.
B.
stockholders.
C. senior
management.
D. peer organizations. - ANSWER-
senior management

3. The GREATEST reduction in overhead costs for
security administration would be
provided by:

A. mandatory access control.
B. role-based access control.
C. decentralized access control. D. discretionary access control. - ANSWER- role-based
access control

4. The BEST reason for an organization to have two discrete firewalls connected
directly to the Internet and to the same DMZ would be to:

A. provide defense in-depth.
B. separate test and production.
C. permit traffic load balancing.
D. prevent a denial-of-service attack. - ANSWER- permit traffic load balancing

,5. Accountability by business process owners can BEST be obtained through:

A. periodic reminder memorandums.
B. strict enforcement of policies.
C. policies signed by IT management.
D. education and awareness meetings. - ANSWER- education and awareness meetings

26. Which of the following is the BEST method for ensuring that security procedures
and guidelines are read and understood?

A. Periodic focus group meetings
B. Periodic reminder memos to management
C. Computer-based training (CBT) presentations
D. Employees signing an acknowledgement of receipt - ANSWER- Computer-based
training (CBT) presentations

8. Which of the following is the MOST effective solution for preventing internal users
from modifying sensitive and classified information?

A. Baseline security standards
B. System access logs
C. Role-based access controls
D. Intrusion detection system - ANSWER- Role-based access controls

9. Which of the following devices should be placed within a DMZ?

A. Network switch
B. Web server
C. Database server
D. File/print server - ANSWER- Web server

10. Access to a sensitive intranet application by mobile users can BEST be
accomplished through:

A. data encryption.
B. digital signatures.
C. strong passwords.
D. two-factor authentication. - ANSWER- two-factor authentication

11. An information security program should be sponsored by:

A. infrastructure management.
B. the corporate legal department.

, C. key business process owners.
D. quality assurance management. - ANSWER- key business process owners

12. The BEST way to ensure that security settings on each platform are in compliance
with information security policies and procedures is to:

A. perform penetration testing.
B. establish security baselines.
C. implement vendor default settings.
D. link policies to an independent standard. - ANSWER- establish security baselines

13. Which of the following will MOST likely reduce the likelihood of an unauthorized
individual gaining access to computing resources by pretending to be an authorized
individual needing to have their password reset?

A. Performing reviews of password resets.
B. Conducting security awareness programs.
C. Increasing the frequency of password changes.
D. Implementing automatic password syntax checking. - ANSWER- Conducting security
awareness programs

14. Which of the following is the BEST indicator that security awareness training has
been effective?

A. Have employees sign to confirm they have read the security policy.
B. More incidents are being reported.
C. A majority of employees have received training.
D. Feedback forms from training are favorable. - ANSWER- More incidents are being
reported

15. Which of the following metrics would be the MOST useful in measuring how
well
information security is monitoring violation logs? The number
of:
A. penetration attempts
investigated.
B. violation log reports
reviewed.
C. violation log entries
reviewed.
D. hours charged to the review process. - ANSWER- penetration attempts
investigated
$14.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
TopGradeGuru
1.5
(2)

Also available in package deal

Thumbnail
Package deal
CISM EXAM BUNDLE |Questions And Answers|Latest updates
-
8 2025
$ 119.92 More info

Get to know the seller

Seller avatar
TopGradeGuru Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
10
Member since
1 year
Number of followers
0
Documents
2429
Last sold
1 month ago
GRADEHUB

We provide access to a wide range of professionally curated exams for students and educators. It offers high-quality, up-to-date assessment materials tailored to various subjects and academic levels. With instant downloads and affordable pricing, it's the go-to resource for exam preparation and academic success.

1.5

2 reviews

5
0
4
0
3
0
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions