Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 153

Mary Smith

Thu, 16 Apr 2026

CISM—Certified Information Security Manager - Part 153

1. In which of the following ways can an information security manager BEST ensure that security controls are adequate for supporting business goals and objectives?

A) Reviewing results of the annual company external audit
B) Adopting internationally accepted controls
C) Enforcing strict disciplinary procedures in case of noncompliance
D) Using the risk management process



2. The authorization to transfer the handling of an internal security incident to a third-party support provider is PRIMARILY defined by the:

A) information security manager
B) escalation procedures
C) disaster recovery plan
D) chain of custody



3. Which of the following outsourced services has the GREATEST need for security monitoring?

A) Enterprise infrastructure
B) Application development
C) Virtual private network (VPN) services
D) Web site hosting



4. Which of the following is done PRIMARILY to address the integrity of information?

A) Assignment of appropriate control permissions
B) Implementation of an Internet security application
C) Implementation of a duplex server system
D) Encryption of email



5. An organization has a policy in which all criminal activity is prosecuted. What is MOST important for the information security manager to ensure when an employee is suspected of using a company computer to commit fraud?

A) The forensics process is immediately initiated
B) The incident response plan is initiated
C) The employee's log files are backed-up
D) Senior management is informed of the situation



1. Right Answer: D
Explanation:

2. Right Answer: D
Explanation:

3. Right Answer: D
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment