Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 91

Mary Smith

Sat, 18 Apr 2026

CISM—Certified Information Security Manager - Part 91

1. Which of the following security mechanisms is MOST effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network?

A) Configuration of firewalls
B) Strength of encryption algorithms
C) Authentication within application
D) Safeguards over keys



2. In the process of deploying a new e-mail system, an information security manager would like to ensure the confidentiality of messages while in transit. Which of the following is the MOST appropriate method to ensure data confidentiality in a new e-mail system implementation?

A) Encryption
B) Digital certificate
C) Digital signature
D) I lashing algorithm



3. The MOST important reason that statistical anomaly-based intrusion detection systems (slat IDSs) are less commonly used than signature-based IDSs, is that statIDSs:

A) create more overhead than signature-based IDSs.
B) cause false positives from minor changes to system variables.
C) generate false alarms from varying user or system actions.
D) cannot detect new types of attacks.



4. An information security manager uses security metrics to measure the:

A) performance of the information security program.
B) performance of the security baseline.
C) effectiveness of the security risk analysis.
D) effectiveness of the incident response team.



5. The MOST important success factor to design an effective IT security awareness program is to:

A) customize the content to the target audience.
B) ensure senior management is represented.
C) ensure that all the staff is trained.
D) avoid technical content but give concrete examples.



1. Right Answer: D
Explanation: If keys are in the wrong hands, documents will be able to be read regardless of where they are on the network. Choice A is incorrect because firewalls can be perfectly configured, but if the keys make it to the other side, they will not prevent the document from being decrypted. Choice B is incorrect because even easy encryption algorithms require adequate resources to break, whereas encryption keys can be easily used. Choice C is incorrect because the application 'front door' controls may be bypassed by accessing data directly.

2. Right Answer: A
Explanation: To preserve confidentiality of a message while in transit, encryption should be implemented. Choices B and C only help authenticate the sender and the receiver.Choice D ensures integrity.

3. Right Answer: C
Explanation: A statistical anomaly-based intrusion detection system (stat IDS) collects data from normal traffic and establishes a baseline. It then periodically samples the network activity based on statistical methods and compares samples to the baseline. When the activity is outside the baseline parameter (clipping level), the IDS notifies the administrator. The baseline variables can include a host's memory or central processing unit (CPU) usage, network packet types and packet quantities. If actions of the users or the systems on the network vary widely with periods of low activity and periods of frantic packet exchange, a stat IDS may not be suitable, as the dramatic swing from one level to another almost certainly will generate false alarms. This weakness will have the largest impact on the operation of the IT systems. Due to the nature of stat IDS operations (i.e., they must constantly attempt to match patterns of activity to the baseline parameters), a stat IDS requires much more overhead and processing than signature-based versions. Due to the nature of a stat IDS '' based on statistics and comparing data with baseline parameters '' this type of IDS may not detect minor changes to system variables and may generate many false positives. Choice D is incorrect; since the stat IDS can monitor multiple system variables, it can detect new types of variables by tracing for abnormal activity of any kind.

4. Right Answer: A
Explanation: The security metrics should be designed so that there is a relationship to the performance of the overall security program in terms of effectiveness measurement.Use of security metrics occurs after the risk assessment process and does not measure it. Measurement of the incident response team performance is included in the overall program performance, so this is an incomplete answer.

5. Right Answer: A
Explanation: Awareness training can only be effective if it is customized to the expectations and needs of attendees. Needs will be quite different depending on the target audience and will vary between business managers, end users and IT staff; program content and the level of detail communicated will therefore be different. Other criteria are also important; however, the customization of content is the most important factor.

0 Comments

Leave a comment