Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 115

Mary Smith

Fri, 17 Apr 2026

CISM—Certified Information Security Manager - Part 115

1. For an organization with operations in different parts of the world, the BEST approach for ensuring that security policies do not conflict with local laws and regulations is to:

A) refer to an external global standard to avoid any regional conflict
B) make policies at a sufficiently high level, so they are globally applicable
C) adopt uniform policies
D) establish a hierarchy of global and local policies



2. Threat and vulnerability assessments are important PRIMARILY because they are:

A) needed to estimate risk
B) the basis for setting control objectives
C) elements of the organization's security posture
D) used to establish security investments



3. Which of the following is the PRIMARY goal of business continuity management?

A) Establish incident response procedures.
B) Assess the impact to business processes.
C) Increase survivability of the organization.
D) Implement controls to prevent disaster.



4. Which of the following should an information security manager establish FIRST to ensure security-related activities are adequately monitored?

A) Internal reporting channels
B) Accountability for security functions
C) Scheduled security assessments
D) Regular reviews of computer system logs



5. Which of the following should be done FIRST when establishing security measures for personal data stored and processed on a human resources management system?

A) Conduct a privacy impact assessment.
B) Evaluate data encryption technologies.
C) Move the system into a separate network.
D) Conduct a vulnerability assessment.



1. Right Answer: D
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: A
Explanation:

0 Comments

Leave a comment