Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 164

Mary Smith

Tue, 21 Apr 2026

CISM—Certified Information Security Manager - Part 164

1. An information security manager is reviewing the impact of a regulation on the organization's human resources system. The NEXT course of action should be to:

A) perform a gap analysis of compliance requirements.
B) assess the penalties for non-compliance.
C) review the organization's most recent audit report.
D) determine the cost of compliance.



2. Which of the following will BEST protect confidential data when connecting large wireless networks to an existing wired-network infrastructure?

A) Mandatory access control (MAC) address filtering
B) Strong passwords
C) Virtual private network (VPN)
D) Firewall



3. A global organization processes and stores large volumes of personal data. Which of the following would be the MOST important attribute in creating a data access policy?

A) Availability
B) Integrity
C) Reliability
D) Confidentiality



4. An organization to integrate information security into its human resource management processes. Which of the following should be the FIRST step?

A) Evaluate the cost of information security integration
B) Assess the business objectives of the processes
C) Identify information security risk associated with the processes
D) Benchmark the processes with best practice to identify gaps



5. Which of the following is MOST important for an information security manager to regularly report to senior management?

A) Results of penetration tests
B) Audit reports
C) Impact of unremediated risks
D) Threat analysis reports



1. Right Answer: A
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: D
Explanation:

4. Right Answer: B
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment