Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 84

Mary Smith

Sat, 18 Apr 2026

CISM—Certified Information Security Manager - Part 84

1. When application-level security controlled by business process owners is found to be poorly managed, which of the following could BEST improve current practices?

A) Centralizing security management
B) Implementing sanctions for noncompliance
C) Policy enforcement by IT management
D) Periodic compliance reviews



2. Security awareness training is MOST likely to lead to which of the following?

A) Decrease in intrusion incidents
B) Increase in reported incidents
C) Decrease in security policy changes
D) Increase in access rule violations



3. The information classification scheme should:

A) consider possible impact of a security breach.
B) classify personal information in electronic form.
C) be performed by the information security manager.
D) classify systems according to the data processed.



4. Which of the following is the BEST method to provide a new user with their initial password for e-mail system access?

A) Interoffice a system-generated complex password with 30 days expiration
B) Give a dummy password over the telephone set for immediate expiration
C) Require no password but force the user to set their own in 10 days
D) Set initial password equal to the user ID with expiration in 30 days



5. An information security program should be sponsored by:

A) infrastructure management.
B) the corporate audit department.
C) key business process owners.
D) information security management.



1. Right Answer: A
Explanation: By centralizing security management, the organization can ensure that security standards are applied to all systems equally and in line with established policy.Sanctions for noncompliance would not be the best way to correct poor management practices caused by work overloads or insufficient knowledge of security practices. Enforcement of policies is not solely the responsibility of IT management. Periodic compliance reviews would not correct the problems, by themselves, although reports to management would trigger corrective action such as centralizing security management.

2. Right Answer: B
Explanation: Reported incidents will provide an indicator as to the awareness level of staff. An increase in reported incidents could indicate that staff is paying more attention to security. Intrusion incidents and access rule violations may or may not have anything to do with awareness levels. A decrease in changes to security policies may or may not correlate to security awareness training.

3. Right Answer: A
Explanation: Data classification is determined by the business risk, i.e., the potential impact on the business of the loss, corruption or disclosure of information. It must be applied to information in all forms, both electronic and physical (paper), and should be applied by the data owner, not the security manager. Choice B is an incomplete answer because it addresses only privacy issues, while choice A is a more complete response. Data classification is determined by the business risk, i.e., the potential impact on the business of the loss, corruption or disclosure of information. It must be applied to information in all forms, both electronic and physical (paper), and should be applied by the data owner, not the security manager.

4. Right Answer: B
Explanation: Documenting the password on paper is not the best method even if sent through interoffice mail if the password is complex and difficult to memorize, the user will likely keep the printed password and this creates a security concern. A dummy (temporary) password that will need to be changed upon first logon is the best method because it is reset immediately and replaced with the user's choice of password, which will make it easier for the user to remember. If it is given to the wrong person, the legitimate user will likely notify security if still unable to access the system, so the security risk is low. Setting an account with no initial password is a security concern even if it is just for a few days. Choice D provides the greatest security threat because user IDs are typically known by both users and security staff, thus compromising access for up to 30 days.

5. Right Answer: C
Explanation: The information security program should ideally be sponsored by business managers, as represented by key business process owners. Infrastructure management is not sufficiently independent and lacks the necessary knowledge regarding specific business requirements. A corporate audit department is not in as good a position to fully understand how an information security program needs to meet the needs of the business. Audit independence and objectivity will be lost, impeding traditional audit functions. Information security implements and executes the program. Although it should promote it at all levels, it cannot sponsor the effort due to insufficient operational knowledge and lack of proper authority.

0 Comments

Leave a comment