Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 224

Mary Smith

Sat, 06 Dec 2025

CISM—Certified Information Security Manager - Part 224

1. An organization performed a risk analysis and found a large number of assets with low-impact vulnerabilities. The NEXT action of the information security manager should be to:

A) determine appropriate countermeasures.
B) transfer the risk to a third party.
C) report to management.
D) quantify the aggregated risk.



2. What is the PRIMARY goal of an incident management program?

A) Minimize impact to the organization.
B) Contain the incident.
C) Identify root cause.
D) Communicate to external entities.



3. An organization has determined that one of its web servers has been compromised. Which of the following actions should be taken to preserve the evidence of the intrusion for forensic analysis and potential litigation?

A) Reboot the server in a secure area to search for digital evidence.
B) Unplug the server from the power.
C) Restrict physical and logical access to the server.
D) Run analysis tools to detect the source of the intrusion.



4. Which of the following is the GREATEST potential exposure created by outsourcing to an application service provider?

A) Denial of service attacks
B) Combining incompatible duties
C) Mixing of data
D) Lack of technical expertise



5. Which of the following BEST indicates an effective vulnerability management program?

A) Risks are managed within acceptable limits.
B) Threats are identified accurately.
C) Vulnerabilities are managed proactively.
D) Vulnerabilities are reported in a timely manner.



1. Right Answer: D
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment