Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 172

Mary Smith

Thu, 16 Apr 2026

CISM—Certified Information Security Manager - Part 172

1. Which of the following is the PRIMARY reason social media has become a popular target for attack?

A) The prevalence of strong perimeter.
B) The reduced effectiveness of access controls.
C) The element of trust created by social media.
D) The accessibility of social media from multiple locations.



2. A validated patch to address a new vulnerability that may affect a mission-critical server has been released.What should be done immediately?

A) Add mitigating controls.
B) Check the server's security and install the patch.
C) Conduct an impact analysis.
D) Take the server off-line and install the patch.



3. Which of the following is the MOST effective way to protect the authenticity of data in transit?

A) Hash value
B) Digital signature
C) Public key
D) Private key



4. Which of the following is the FIRST task when determining an organization's information security profile?

A) Build an asset inventory
B) List administrative privileges
C) Establish security standards
D) Complete a threat assessment



5. To ensure appropriate control of information processed in IT systems, security safeguards should be based PRIMARILY on:

A) established guidelines
B) criteria consistent with classification levels
C) efficient technical processing considerations
D) overall IT capacity and operational constraints



1. Right Answer: D
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: A
Explanation:

0 Comments

Leave a comment