100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CISM Exam Test Questions With 100% Verified Solutions

Puntuación
-
Vendido
-
Páginas
27
Grado
A+
Subido en
26-05-2025
Escrito en
2024/2025

CISM Exam Test Questions With 100% Verified Solutions 1. Which of the following BEST indicates the probability that a successful attack will occur? A. Value of the target and level of protection is high B. Motivation and ability of the attacker is high C. Value of the target is high and protection is low D. Motivation of the attacker and value of the target is high - ANSWER- Value of the target is high and protection is low 2. The results of an organizational risk analysis should FIRST be shared with: A. external auditors. B. stockholders. C. senior management. D. peer organizations. - ANSWER- senior management 3. The GREATEST reduction in overhead costs for security administration would be provided by: A. mandatory access control. B. role-based access control. C. decentralized access control. D. discretionary access control. - ANSWER- role-based access control 4. The BEST reason for an organization to have two discrete firewalls connected directly to the Internet and to the same DMZ would be to: A. provide defense in-depth. B. separate test and production. C. permit traffic load balancing. D. prevent a denial-of-service attack. - ANSWER- permit traffic load balancing 5. Accountability by business process owners can BEST be obtained through: A. periodic reminder memorandums. B. strict enforcement of policies. C. policies signed by IT management. D. education and awareness meetings. - ANSWER- education and awareness meetings 26. Which of the following is the BEST method for ensuring that security procedures and guidelines are read and understood? A. Periodic focus group meetings B. Periodic reminder memos to management C. Computer-based training (CBT) presentations D. Employees signing an acknowledgement of receipt - ANSWER- Computer-based training (CBT) presentations 8. Which of the following is the MOST effective solution for preventing internal users from modifying sensitive and classified information? A. Baseline security standards B. System access logs C. Role-based access controls D. Intrusion detection system - ANSWER- Role-based access controls 9. Which of the following devices should be placed within a DMZ? A. Network switch B. Web server C. Database server D. File/print server - ANSWER- Web server 10. Access to a sensitive intranet application by mobile users can BEST be accomplished through: A. data encryption. B. digital signatures. C. strong passwords. D. two-factor authentication. - ANSWER- two-factor authentication 11. An information security program should be sponsored by: A. infrastructure management. B. the corporate legal department. C. key business process owners. D. quality assurance management. - ANSWER- key business process owners 12. The BEST way to ensure that security settings on each platform are in compliance with information security policies and procedures is to: A. perform penetration testing. B. establish security baselines. C. implement vendor default settings. D. link policies to an independent standard. - ANSWER- establish security baselines 13. Which of the following will MOST likely reduce the likelihood of an unauthorized individual gaining access to computing resources by pretending to be an authorized individual needing to have their password reset? A. Performing reviews of password resets. B. Conducting security awareness programs. C. Increasing the frequency of password changes. D. Implementing automatic password syntax checking. - ANSWER- Conducting security awareness programs 14. Which of the following is the BEST indicator that security awareness training has been effective? A. Have employees sign to confirm they have read the security policy. B. More incidents are being reported. C. A majority of employees have received training. D. Feedback forms from training are favorable. - ANSWER- More incidents are being reported 15. Which of the following metrics would be the MOST useful in measuring how well information security is monitoring violation logs? The number of: A. penetration attempts investigated. B. violation log reports reviewed. C. violation log entries reviewed. D. hours charged to the review process. - ANSWER- penetration attempts investigated

Mostrar más Leer menos
Institución
CISM
Grado
CISM










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CISM
Grado
CISM

Información del documento

Subido en
26 de mayo de 2025
Número de páginas
27
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CISM Exam Test Questions With 100% Verified
Solutions

1. Which of the following BEST indicates the probability that a successful attack will
occur?

A. Value of the target and level of protection is high
B. Motivation and ability of the attacker is high
C. Value of the target is high and protection is low
D. Motivation of the attacker and value of the target is high - ANSWER- Value of the
target is high and protection is low

2. The results of an organizational risk analysis should FIRST be shared with:

A. external
auditors.
B.
stockholders.
C. senior
management.
D. peer organizations. - ANSWER-
senior management

3. The GREATEST reduction in overhead costs for
security administration would be
provided by:

A. mandatory access control.
B. role-based access control.
C. decentralized access control. D. discretionary access control. - ANSWER- role-based
access control

4. The BEST reason for an organization to have two discrete firewalls connected
directly to the Internet and to the same DMZ would be to:

A. provide defense in-depth.
B. separate test and production.
C. permit traffic load balancing.
D. prevent a denial-of-service attack. - ANSWER- permit traffic load balancing

,5. Accountability by business process owners can BEST be obtained through:

A. periodic reminder memorandums.
B. strict enforcement of policies.
C. policies signed by IT management.
D. education and awareness meetings. - ANSWER- education and awareness meetings

26. Which of the following is the BEST method for ensuring that security procedures
and guidelines are read and understood?

A. Periodic focus group meetings
B. Periodic reminder memos to management
C. Computer-based training (CBT) presentations
D. Employees signing an acknowledgement of receipt - ANSWER- Computer-based
training (CBT) presentations

8. Which of the following is the MOST effective solution for preventing internal users
from modifying sensitive and classified information?

A. Baseline security standards
B. System access logs
C. Role-based access controls
D. Intrusion detection system - ANSWER- Role-based access controls

9. Which of the following devices should be placed within a DMZ?

A. Network switch
B. Web server
C. Database server
D. File/print server - ANSWER- Web server

10. Access to a sensitive intranet application by mobile users can BEST be
accomplished through:

A. data encryption.
B. digital signatures.
C. strong passwords.
D. two-factor authentication. - ANSWER- two-factor authentication

11. An information security program should be sponsored by:

A. infrastructure management.
B. the corporate legal department.

, C. key business process owners.
D. quality assurance management. - ANSWER- key business process owners

12. The BEST way to ensure that security settings on each platform are in compliance
with information security policies and procedures is to:

A. perform penetration testing.
B. establish security baselines.
C. implement vendor default settings.
D. link policies to an independent standard. - ANSWER- establish security baselines

13. Which of the following will MOST likely reduce the likelihood of an unauthorized
individual gaining access to computing resources by pretending to be an authorized
individual needing to have their password reset?

A. Performing reviews of password resets.
B. Conducting security awareness programs.
C. Increasing the frequency of password changes.
D. Implementing automatic password syntax checking. - ANSWER- Conducting security
awareness programs

14. Which of the following is the BEST indicator that security awareness training has
been effective?

A. Have employees sign to confirm they have read the security policy.
B. More incidents are being reported.
C. A majority of employees have received training.
D. Feedback forms from training are favorable. - ANSWER- More incidents are being
reported

15. Which of the following metrics would be the MOST useful in measuring how
well
information security is monitoring violation logs? The number
of:
A. penetration attempts
investigated.
B. violation log reports
reviewed.
C. violation log entries
reviewed.
D. hours charged to the review process. - ANSWER- penetration attempts
investigated
$14.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
TopGradeGuru
1.5
(2)

Documento también disponible en un lote

Conoce al vendedor

Seller avatar
TopGradeGuru Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
10
Miembro desde
1 año
Número de seguidores
0
Documentos
2429
Última venta
1 mes hace
GRADEHUB

We provide access to a wide range of professionally curated exams for students and educators. It offers high-quality, up-to-date assessment materials tailored to various subjects and academic levels. With instant downloads and affordable pricing, it's the go-to resource for exam preparation and academic success.

1.5

2 reseñas

5
0
4
0
3
0
2
1
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes