Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 171

Mary Smith

Wed, 15 Apr 2026

CISM—Certified Information Security Manager - Part 171

1. Which of the following is the MOST effective data loss control when connecting a personally owned mobile device to the corporate email system?

A) Email must be stored in an encrypted format on the mobile device.
B) Email synchronization must be prevented when connected to a public Wi-Fi hotspot.
C) A senior manager must approve each connection.
D) Users must agree to allow the mobile device to be wiped if it is lost.



2. Key systems necessary for branch operations reside at corporate headquarters. Branch A is negotiating with a third party to provide disaster recovery facilities.Which of the following contract terms would be the MOST significant concern?

A) The hot site for the branch may have to be shared.
B) Connectivity is not provided from the hot site to corporate headquarters.
C) Penalty clauses for nonperformance are not included in contract.
D) The right to audit the hot site is not provided in the contract.



3. A regulatory organization sends an email to an information security manager warning of an impending cyber-attack. The information security manager shouldFIRST:

A) validate the authenticity of the alert
B) determine whether the attack is in progress
C) alert the network operations center
D) reply asking for more details



4. The use of a business case to obtain funding for an information security investment is MOST effective when the business case:

A) relates information security policies and standards into business requirements
B) relates the investment to the organization's strategic plan.
C) realigns information security objectives to organizational strategy.
D) articulates management's intent and information security directives in clear language.



5. The PRIMARY reason for defining the information security roles and responsibilities of staff throughout an organization is to:

A) reinforce the need for training
B) increase corporate accountability
C) comply with security policy
D) enforce individual accountability



1. Right Answer: D
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: B
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment