Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 120

Mary Smith

Fri, 17 Apr 2026

CISM—Certified Information Security Manager - Part 120

1. Which of the following is MOST important to the successful promotion of good security management practices?

A) Security metrics
B) Security baselines
C) Management support
D) Periodic training



2. Which of the following environments represents the GREATEST risk to organizational security?

A) Locally managed file server
B) Enterprise data warehouse
C) Load-balanced, web server cluster
D) Centrally managed data switch



3. Nonrepudiation can BEST be assured by using:

A) delivery path tracing.
B) reverse lookup translation.
C) out-of-hand channels.
D) digital signatures.



4. Of the following, the BEST method for ensuring that temporary employees do not receive excessive access rights is:

A) mandatory access controls.
B) discretionary access controls.
C) lattice-based access controls.
D) role-based access controls.



5. Which of the following areas is MOST susceptible to the introduction of security weaknesses?

A) Database management
B) Tape backup management
C) Configuration management
D) Incident response management



1. Right Answer: C
Explanation: Without management support, all other efforts will be undermined. Metrics, baselines and training are all important, but they depend on management support for their success.

2. Right Answer: A
Explanation: A locally managed file server will be the least likely to conform to organizational security policies because it is generally subject to less oversight and monitoring.Centrally managed data switches, web server clusters and data warehouses are subject to close scrutiny, good change control practices and monitoring.

3. Right Answer: D
Explanation: Effective nonrepudiation requires the use of digital signatures. Reverse lookup translation involves converting Internet Protocol (IP) addresses to usernames.Delivery path tracing shows the route taken but does not confirm the identity of the sender. Out-of-band channels are useful when, for confidentiality, it is necessary to break a message into two parts that are sent by different means.

4. Right Answer: D
Explanation: Role-based access controls will grant temporary employee access based on the job function to be performed. This provides a better means of ensuring that the access is not more or less than what is required. Discretionary, mandatory and lattice-based access controls are all security models, hut they do not address the issue of temporary employees as well as role-based access controls.

5. Right Answer: C
Explanation: Configuration management provides the greatest likelihood of security weaknesses through misconfiguration and failure to update operating system (OS) code correctly and on a timely basis.

0 Comments

Leave a comment