Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 233

Mary Smith

Sat, 12 Jul 2025

CISM—Certified Information Security Manager - Part 233

1. The BEST way to isolate corporate data stored on employee-owned mobile devices would be to implement:

A) a sandbox environment.
B) device encryption.
C) two-factor authentication.
D) a strong password policy.



2. Which of the following is the MOST important outcome from vulnerability scanning?

A) Prioritization of risks
B) Information about steps necessary to hack the system
C) Identification of back doors
D) Verification that systems are properly configured



3. Which of the following should be the PRIMARY expectation of management when an organization introduces an information security governance framework?

A) Optimized information security resources
B) Consistent execution of information security strategy
C) Improved accountability to shareholders
D) Increased influence of security management



4. For a user of commercial software downloaded from the Internet, which of the following is the MOST effective means of ensuring authenticity?

A) Digital signatures
B) Digital certificates
C) Digital code signing
D) Steganography



5. When developing a new application, which of the following is the BEST approach to ensure compliance with security requirements?

A) Provide security training for developers.
B) Prepare detailed acceptance criteria.
C) Adhere to change management processes.
D) Perform a security gap analysis.



1. Right Answer: B
Explanation:

2. Right Answer: D
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: B
Explanation:

0 Comments

Leave a comment