Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 207

Mary Smith

Sat, 24 May 2025

CISM—Certified Information Security Manager - Part 207

1. Which of the following is MOST important to verify when reviewing the effectiveness of response to an information security incident?

A) Lessons learned have been implemented.
B) Testing has been completed on time.
C) Test results have been properly recorded.
D) Metrics have been captured in a dashboard.



2. Which of the following is a security manager's FIRST priority after an organization's critical system has been compromised?

A) Implement improvements to prevent recurrence.
B) Restore the compromised system.
C) Preserve incident-related data.
D) Identify the malware that compromised the system.



3. The PRIMARY focus of a training curriculum for members of an incident response team should be:

A) specific role training
B) external corporate communication
C) security awareness
D) technology training



4. The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:

A) results of exit interviews
B) previous training sessions.
C) examples of help desk requests.
D) responses to security questionnaires.



5. Which of the following is MOST important for the effectiveness of an incident response function?

A) Enterprise security management system and forensic tools.
B) Establishing prior contacts with law enforcement
C) Training of all users on when and how to report
D) Automated incident tracking and reporting tools



1. Right Answer: D
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: A
Explanation:

0 Comments

Leave a comment