Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 133

Mary Smith

Thu, 16 Apr 2026

CISM—Certified Information Security Manager - Part 133

1. Which of the following should be in place before a black box penetration test begins?

A) IT management approval
B) Proper communication and awareness training
C) A clearly stated definition of scope
D) An incident response plan



2. What is the MOST important element to include when developing user security awareness material?

A) Information regarding social engineering
B) Detailed security policies
C) Senior management endorsement
D) Easy-to-read and compelling information



3. What is the MOST important success factor in launching a corporate information security awareness program?

A) Adequate budgetary support
B) Centralized program management
C) Top-down approach
D) Experience of the awareness trainers



4. Which of the following events generally has the highest information security impact?

A) Opening a new office
B) Merging with another organization
C) Relocating the data center
D) Rewiring the network



5. The configuration management plan should PRIMARILY be based upon input from:

A) business process owners.
B) the information security manager.
C) the security steering committee.
D) IT senior management.



1. Right Answer: C
Explanation: Having a clearly stated definition of scope is most important to ensure a proper understanding of risk as well as success criteria, IT management approval may not be required based on senior management decisions. Communication, awareness and an incident response plan are not a necessary requirement. In fact, a penetration test could help promote the creation and execution of the incident response plan.

2. Right Answer: D
Explanation: Making security awareness material easy and compelling to read is the most important success factor. Users must be able to understand, in easy terms, complex security concepts in a way that makes compliance more accessible. Choice A would also be important but it needs to be presented in an adequate format.Detailed security policies might not necessarily be included in the training materials. Senior management endorsement is important for the security program as a whole and not necessarily for the awareness training material.

3. Right Answer: C
Explanation: Senior management support will provide enough resources and will focus attention to the program: training should start at the top levels to gain support and sponsorship. Funding is not a primary concern. Centralized management does not provide sufficient support. Trainer experience, while important, is not the primary success factor.

4. Right Answer: B
Explanation: Merging with or acquiring another organization causes a major impact on an information security management function because new vulnerabilities and risks are inherited. Opening a new office, moving the data center to a new site, or rewiring a network may have information security risks, but generally comply with corporate security policy and are easier to secure.

5. Right Answer: D
Explanation: Although business process owners, an information security manager and the security steering committee may provide input regarding a configuration management plan, its final approval is the primary responsibility of IT senior management.

0 Comments

Leave a comment