Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 97

Mary Smith

Tue, 21 Apr 2026

CISM—Certified Information Security Manager - Part 97

1. At what stage of the applications development process would encryption key management initially be addressed?

A) Requirements development
B) Deployment
C) Systems testing
D) Code reviews



2. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is:

A) messages displayed at every logon.
B) periodic security-related e-mail messages.
C) an Intranet web site for information security.
D) circulating the information security policy.



3. Which of the following would be the BEST defense against sniffing?

A) Password protect the files
B) Implement a dynamic IP address scheme
C) Encrypt the data being transmitted
D) Set static mandatory access control (MAC) addresses



4. A digital signature using a public key infrastructure (PKI) will:

A) not ensure the integrity of a message.
B) rely on the extent to which the certificate authority (CA) is trusted.
C) require two parties to the message exchange.
D) provide a high level of confidentiality.



5. When configuring a biometric access control system that protects a high-security data center, the system's sensitivity level should be set:

A) to a higher false reject rate (FRR).
B) to a lower crossover error rate.
C) to a higher false acceptance rate (FAR).
D) exactly to the crossover error rate.



1. Right Answer: A
Explanation: Encryption key management has to be integrated into the requirements of the application's design. During systems testing and deployment would be too late since the requirements have already been agreed upon. Code reviews are part of the final quality assurance (QA) process and would also be too late in the process.

2. Right Answer: A
Explanation: Logon banners would appear every time the user logs on, and the user would be required to read and agree to the same before using the resources. Also, as the message is conveyed in writing and appears consistently, it can be easily enforceable in any organization. Security-related e-mail messages are frequently considered as 'Spam' by network users and do not, by themselves, ensure that the user agrees to comply with security requirements. The existence of an Intranet web site does not force users to access it and read the information. Circulating the information security policy atone does not confirm that an individual user has read, understood and agreed to comply with its requirements unless it is associated with formal acknowledgment, such as a user's signature of acceptance.

3. Right Answer: C
Explanation: Encrypting the data will obfuscate the data so that they are not visible in plain text. Someone would have to collate the entire data stream and try decrypting it, which is not easy. Passwords can be recovered by brute-force attacks and by password crackers, so this is not the best defense against sniffing. IP addresses can always be discovered, even if dynamic IP addresses are implemented. The person sniffing traffic can initiate multiple sessions for possible IP addresses.Setting static mandatory access control (MAC) addresses can prevent address resolution protocol (ARP) poisoning, but it does not prevent sniffing.

4. Right Answer: B
Explanation: The certificate authority (CA) is a trusted third party that attests to the identity of the signatory, and reliance will be a function of the level of trust afforded the CA. A digital signature would provide a level of assurance of message integrity, but it is a three-party exchange, including the CA. Digital signatures do not require encryption of the message in order to preserve confidentiality.

5. Right Answer: A
Explanation: Biometric access control systems are not infallible. When tuning the solution, one has to adjust the sensitivity level to give preference either to false reject rate(type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing access to an invalid user. As the sensitivity of the biometric system is adjusted, these values change inversely. At one point, the two values intersect and are equal. This condition creates the crossover error rate, which is a measure of the system accuracy. In systems where the possibility of false rejects is a problem, it may be necessary' to reduce sensitivity and thereby increase the number of false accepts. This is sometimes referred to as equal error rate (EER). In a very sensitive system, it may be desirable to minimize the number of false accepts '' the number of unauthorized persons allowed access. To do this, the system is tuned to be more sensitive, which causes the false rejects the number of authorized persons disallowed access to increase.

0 Comments

Leave a comment