Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 228

Mary Smith

Sat, 12 Jul 2025

CISM—Certified Information Security Manager - Part 228

1. Which of the following contributes MOST to the effective implementation of an information security strategy?

A) Reporting of security metrics
B) Regular security awareness training
C) Endorsement by senior management
D) Implementation of security standards



2. The MAIN reason for internal certification of web-based business applications is to ensure:

A) compliance with industry standards.
B) changes to the organizational policy framework are identified.
C) up-to-date web technology is being used.
D) compliance with organizational policies.



3. Knowing which of the following is MOST important when the information security manager is seeking senior management commitment?

A) Security costs
B) Technical vulnerabilities
C) Security technology requirements
D) Implementation tasks



4. Which of the following would be the BEST way for a company to reduce the risk of data loss resulting from employee-owned devices accessing the corporate email system?

A) Link the bring-your-device (BYOD) policy to the existing staff disciplinary policy.
B) Require employees to undergo training before permitting access to the corporate email.
C) Require employees to install a reputable mobile anti-virus solution on their personal devices.
D) Use a mobile device management solution to isolate the local corporate email storage.



5. Which of the following is the MOST effective defense against spear phishing attacks?

A) Unified threat management
B) Web filtering
C) Anti-spam solutions
D) User awareness training



1. Right Answer: C
Explanation:

2. Right Answer: D
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: D
Explanation:

0 Comments

Leave a comment