Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 179

Mary Smith

Wed, 15 Apr 2026

CISM—Certified Information Security Manager - Part 179

1. An organization determines that an end-user has clicked on a malicious link. Which of the following would MOST effectively prevent similar situations from recurring?

A) End-user training
B) Virus protection
C) End-user access control
D) Updated security policies



2. Which of the following is the PRIMARY benefit of using agentless endpoint security solutions?

A) Decreased network bandwidth usage
B) Decreased administration
C) Increased resiliency
D) More comprehensive information results



3. Which of the following MOST efficiently ensures the proper installation of a firewall policy that restricts a small group of internal IP addresses from accessing theInternet?

A) A connectivity test from the restricted host
B) A simulated denial of service attack against the firewall
C) A port scan of the firewall from an external source
D) A review of the current firewall configuration



4. An organization with a large number of users finds it necessary to improve access control applications. Which of the following would BEST help to prevent unauthorized user access to networks and applications?

A) Single sign-on
B) Biometric systems
C) Complex user passwords
D) Access control lists



5. Senior management has endorsed a comprehensive information security policy. Which of the following should the organization do NEXT?

A) Promote awareness of the policy among employees.
B) Seek policy buy-in from business stakeholders.
C) Implement an authentication and authorization system.
D) Identify relevant information security frameworks for adoption.



1. Right Answer: A
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: B
Explanation:

0 Comments

Leave a comment