Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 217

Mary Smith

Mon, 24 Mar 2025

CISM—Certified Information Security Manager - Part 217

1. An organization establishes an internal document collaboration site. To ensure data confidentiality of each project group, it is MOST important to:

A) prohibit remote access to the site.
B) periodically recertify access rights.
C) enforce document lifecycle management.
D) conduct a vulnerability assessment.



2. When aligning an organization's information security program with other risk and control activities, it is MOST important to:

A) develop an information security governance framework.
B) have information security management report to the chief risk officer.
C) ensure adequate financial resources are available.
D) integrate security within the system development life cycle.



3. A large number of exceptions to an organization's information security standards have been granted after senior management approved a bring your own device(BYOD) program. To address this situation, it is MOST important for the information security manager to:

A) introduce strong authentication on devices.
B) reject new exception requests.
C) update the information security policy.
D) require authorization to wipe lost devices.



4. An information security manager has determined that the mean time to prioritize information security incidents has increased to an unacceptable level. Which of the following processes would BEST enable the information security manager to address this concern?

A) Incident classification
B) Vulnerability assessment
C) Incident response
D) Forensic analysis



5. Which of the following is the PRIMARY responsibility of the information security manager when an organization implements the use of personally-owned devices on the corporate network?

A) Requiring remote wipe capabilities
B) Enforcing defined policy and procedures
C) Conducting security awareness training
D) Encrypting the data on mobile devices



1. Right Answer: B
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: B
Explanation:

0 Comments

Leave a comment