Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 178

Mary Smith

Thu, 16 Apr 2026

CISM—Certified Information Security Manager - Part 178

1. Which of the following would BEST detect malicious damage arising from an internal threat?

A) Access control list
B) Encryption
C) Fraud awareness training
D) Job rotation



2. Which of the following is MOST important for an information security manager to communicate to senior management regarding the security program?

A) Potential risks and exposures
B) Impact analysis results
C) Security architecture changes
D) User roles and responsibilities



3. Which of the following is the BEST defense against a brute force attack?

A) Discretionary access control
B) Intruder detection lockout
C) Time-of-day restrictions
D) Mandatory access control



4. Which of the following would BEST help to ensure an organization's security program is aligned with business objectives?

A) Security policies are reviewed and approved by the chief information officer.
B) The security strategy is reviewed and approved by the organization's executive committee.
C) The organization's board of directors includes a dedicated information security specialist.
D) Project managers receive annual information security awareness training.



5. Which of the following will MOST effectively minimize the chance of inadvertent disclosure of confidential information?

A) Following the principle of least privilege
B) Restricting the use of removable media
C) Applying data classification rules
D) Enforcing penalties for security policy violations



1. Right Answer: D
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: B
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment