Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 77

Mary Smith

Sat, 18 Apr 2026

CISM—Certified Information Security Manager - Part 77

1. A risk profile supports effective security decisions PRIMARILY because it:

A) defines how to best mitigate future risks.
B) identifies priorities for risk reduction.
C) enables comparison with industry best practices.
D) describes security threats.



2. Which of the following would be the MOST effective to mitigate the risk of data loss in the event of a stolen laptop?

A) Providing end-user awareness training focused on travelling with laptops
B) Deploying end-point data loss prevention software on the laptop
C) Encrypting the hard drive
D) Utilizing a strong password



3. Which of the following is the BEST method for determining whether new risks exist in legacy applications?

A) Regularly scheduled risk assessments
B) Automated vulnerability scans
C) Third-party penetration testing
D) Frequent updates to the risk register



4. Which of the following processes can be used to remediate identified technical vulnerabilities?

A) Running baseline configurations
B) Conducting a risk assessment
C) Performing a business impact analysis (BIA)
D) Running automated scanners



5. Which of the following would provide senior management with the BEST information to better understand the organization's information security risk profile?

A) Scenarios that impact business operations
B) Scenarios that disrupt client services
C) Scenarios that impact business goals
D) Scenarios that have a monetary impact



1. Right Answer: B
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: B
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment