Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 156

Mary Smith

Thu, 16 Apr 2026

CISM—Certified Information Security Manager - Part 156

1. Segregation of duties is a security control PRIMARILY used to:

A) establish dual check.
B) establish hierarchy.
C) limit malicious behavior.
D) decentralize operations.



2. Which of the following is the BEST approach when using sensitive customer data during the testing phase of a systems development project?

A) Establish the test environment on a separate network.
B) Sanitize customer data.
C) Monitor the test environment for data loss.
D) Implement equivalent controls to those on the source system.



3. BEST -Which of the following analyses willidentify the external influences to an organization's information security?

A) Gap analysis
B) Business impact analysis
C) Threat analysis
D) Vulnerability analysis.



4. Spoofing should be prevented because it may be used to:

A) assemble information, track traffic, and identify network vulnerabilities.
B) predict which way a program will branch when an option is presented.
C) gain illegal entry to a secure system by faking the sender's address.
D) capture information such as password traveling through the network.



5. Utilizing external resources for highly technical information security tasks allows an information security manager to:

A) distribute technology risk.
B) leverage limited resources.
C) outsource responsibility.
D) transfer business risk.



1. Right Answer: C
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: D
Explanation:

0 Comments

Leave a comment