{"id":58684,"date":"2022-10-31T13:17:10","date_gmt":"2022-10-31T13:17:10","guid":{"rendered":"https:\/\/www.testpreptraining.com\/tutorial\/?page_id=58684"},"modified":"2022-10-31T13:20:21","modified_gmt":"2022-10-31T13:20:21","slug":"isaca-cism-certified-information-security-manager","status":"publish","type":"page","link":"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/","title":{"rendered":"ISACA (CISM): Certified Information Security Manager"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"400\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2022\/10\/ISACA-CISM-Sample-Questions.jpg\" alt=\"ISACA CISM Sample Questions\" class=\"wp-image-58685\"\/><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 1 &#8211; A public website should protect consumers&#8217; private information using the following methods?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Applying strong authentication to online accounts<\/li><li>B. Encrypting consumer data in transit and at rest<\/li><li>C. Using a secure encrypted transport layer<\/li><li>D. Applying a masking policy to the consumer data<\/li><\/ul>\n\n\n\n<p>Correct Answer: B<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 2 &#8211; The information security manager should PRIMARILY consider the following when developing an incident response plan:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. affected stakeholders.<\/li><li>B. incident response team.<\/li><li>C. availability of technical resources.<\/li><li>D. media coverage<\/li><\/ul>\n\n\n\n<p>Correct Answer: A<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 3 &#8211; An information security manager should consider which of the following MOST crucial factors when determining whether an asset is appropriately classified?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Value to the business<\/li><li>B. Security policy requirements<\/li><li>C. Ownership of information<\/li><li>D. Level of protection<\/li><\/ul>\n\n\n\n<p>Correct Answer: A<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 4 &#8211; In order for an incident response team to be most effective, it must:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. be updated based on lessons learned.<\/li><li>B. have team members who are trained security personnel.<\/li><li>C. meets on a regular basis to review log files.<\/li><li>D. incidents are identified using a security information and event monitoring (SIEM) system.<\/li><\/ul>\n\n\n\n<p>Correct Answer: A<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 5 &#8211; It is essential that the information security manager has a thorough understanding of the organization&#8217;s business goals so they can:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. relate information security to change management.<\/li><li>B. develop an information security strategy.<\/li><li>C. develop operational procedures<\/li><li>D. define key performance indicators (KPIs).<\/li><\/ul>\n\n\n\n<p>Correct Answer: D<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 6 &#8211; How can an information security manager be successful if he or she doesn&#8217;t understand the program of information security?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Understanding current and emerging technologies<\/li><li>B. Establishing key performance indicators (KPIs)<\/li><li>C. Conducting periodic risk assessments<\/li><li>D. Obtaining stakeholder input<\/li><\/ul>\n\n\n\n<p>Correct Answer: D<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 7 &#8211; Using an organization&#8217;s perimeter firewall, an attacker gained access and altered it to allow wider external access and data theft. What is the best way to identify this incident in a timely manner?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Implementing a data loss prevention (DLP) suite<\/li><li>B. Deploying an intrusion prevention system (IPS)<\/li><li>C. Deploying a security information and event management system (SIEM)<\/li><li>D. Conducting regular system administrator awareness training<\/li><\/ul>\n\n\n\n<p>Correct Answer: C<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 8 &#8211; Identifying indicators of an information security program&#8217;s success is the BEST approach.<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. supporting major information security initiatives.<\/li><li>B. reflecting the corporate risk culture.<\/li><li>C. reducing information security program spending.<\/li><li>D. demonstrating the effectiveness of the security program.<\/li><\/ul>\n\n\n\n<p>Correct Answer: D<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 9 &#8211; What is the most likely security event that will trigger an incident response plan and escalate to management for an organization that provides web-based services?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Anti-malware alerts on several employees\u2019 workstations<\/li><li>B. Several port scans of the web server<\/li><li>C. Multiple failed login attempts on an employee&#8217;s workstation<\/li><li>D. Suspicious network traffic originating from the demilitarized zone (DMZ)<\/li><\/ul>\n\n\n\n<p>Correct Answer: A<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 10 &#8211; As part of contract negotiations with a third party, which of the following would be the MOST effective method to address the security concerns of an organization?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Reviewing the third-party contract with the organization\u2019s legal department.<\/li><li>B. Communicating security policy with the third-party vendor.<\/li><li>C. Ensuring security is involved in the procurement process.<\/li><li>D. Conducting an information security audit on the third-party vendor.<\/li><\/ul>\n\n\n\n<p>Correct Answer: B<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 11 &#8211; Which of the following is MOST frequently reviewed as part of web application security monitoring?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Audit reports<\/li><li>B. Access logs<\/li><li>C. Access lists<\/li><li>D. Threat metrics<\/li><\/ul>\n\n\n\n<p>Correct Answer: B<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 12 &#8211; A manager of information security should ensure that security is incorporated into the project development process of an organization by using which of the following methods?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Developing good communications with the project management office (PMO).<\/li><li>B. Participating in project initiation, approval, and funding.<\/li><li>C. Conducting security reviews during design, testing, and implementation.<\/li><li>D. Integrati g organization\u2019s security requirements into project management.<\/li><\/ul>\n\n\n\n<p>Correct Answer: D<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 13 &#8211; Information security programs and underlying business processes can be evaluated most effectively by determining which of the following provides the MOST relevant information.<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. SWOT analysis<\/li><li>B. Industry benchmarks<\/li><li>C. Cost-benefit analysis<\/li><li>D. Balanced scorecard<\/li><\/ul>\n\n\n\n<p>Correct Answer: D<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 14 &#8211; How likely is it that an enterprise security policy will address this issue?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Definitions of responsibilities<\/li><li>B. Retention schedules<\/li><li>C. System access specifications<\/li><li>D. Organizational risk<\/li><\/ul>\n\n\n\n<p>Correct Answer: A<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 15 &#8211; For incident response testing, a tabletop test scenario should be developed with the following primary purpose:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. measuring management engagement as part of an incident response team.<\/li><li>B. providing participants with situations for ensuring the understanding of their roles.<\/li><li>C. giving the business a measure of the organization&#8217;s overall readiness.<\/li><li>D. challenging the incident response team for solving the problem under pressure.<\/li><\/ul>\n\n\n\n<p>Correct Answer: B<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 16 &#8211; Organizations can benefit from an information security risk analysis BEST by ensuring:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. the infrastructure has the appropriate level of access control.<\/li><li>B. cost-effective decisions are made with regard to which assets need protection<\/li><li>C. an appropriate level of funding is applied to security processes.<\/li><li>D. the organization implements appropriate security technologies<\/li><\/ul>\n\n\n\n<p>Correct Answer: B<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 17 &#8211; The local security regulations in a multinational organization should take precedence over the global security policy for three main reasons:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. business objectives are defined by local business unit managers.<\/li><li>B. deploying awareness of local regulations is more practical than global policy.<\/li><li>C. global security policies include unnecessary controls for local businesses.<\/li><li>D. requirements of local regulations take precedence.<\/li><\/ul>\n\n\n\n<p>Correct Answer: D<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 18 &#8211; A manager of information security should first understand the impact that a new regulatory requirement will have on his or her organization&#8217;s information security controls by:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. conducting a cost-benefit analysis.<\/li><li>B. conducting a risk assessment.<\/li><li>C. interviewing senior management.<\/li><li>D. performing a gap analysis.<\/li><\/ul>\n\n\n\n<p>Correct Answer: D<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 19 &#8211; In order to evaluate the existing information security controls and select new information security controls, which of the following processes should management use when changing the enterprise business strategy?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Access control management<\/li><li>B. Change management<\/li><li>C. Configuration management<\/li><li>D. Risk management<\/li><\/ul>\n\n\n\n<p>Correct Answer: D<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Question 20 &#8211; Which of the given would be the most suitable way for building a risk-aware culture?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Periodically changing risk awareness messages.<\/li><li>B. Ensuring that threats are communicated organization-wide in a timely manner.<\/li><li>C. Periodically testing compliance with security controls and post results.<\/li><li>D. Establishing incentives and a channel for staff for reporting risks.<\/li><\/ul>\n\n\n\n<p>Correct Answer: C<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.testpreptraining.ai\/information-security-manager-cism-free-practice-test\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"90\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/06\/cism.png\" alt=\"cism free practice tests\" class=\"wp-image-7226\"\/><\/a><\/figure>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Question 1 &#8211; A public website should protect consumers&#8217; private information using the following methods? A. Applying strong authentication to online accounts B. Encrypting consumer data in transit and at rest C. Using a secure encrypted transport layer D. Applying a masking policy to the consumer data Correct Answer: B Question 2 &#8211; The information&#8230;<\/p>\n","protected":false},"author":1,"featured_media":58685,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[851],"tags":[9327,9328],"class_list":["post-58684","page","type-page","status-publish","has-post-thumbnail","hentry","category-isaca","tag-isaca-cism-certified-information-security-manager-free-practice-tests","tag-isaca-cism-certified-information-security-manager-sample-questions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ISACA (CISM): Certified Information Security Manager<\/title>\n<meta name=\"description\" content=\"Prepare for the ISACA (CISM): Certified Information Security Manager exam with sample questions &amp; answers, and free practice tests as well!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISACA (CISM): Certified Information Security Manager\" \/>\n<meta property=\"og:description\" content=\"Prepare for the ISACA (CISM): Certified Information Security Manager exam with sample questions &amp; answers, and free practice tests as well!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"Testprep Training Tutorials\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-31T13:20:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2022\/10\/ISACA-CISM-Sample-Questions.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/\",\"name\":\"ISACA (CISM): Certified Information Security Manager\",\"isPartOf\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\"},\"datePublished\":\"2022-10-31T13:17:10+00:00\",\"dateModified\":\"2022-10-31T13:20:21+00:00\",\"description\":\"Prepare for the ISACA (CISM): Certified Information Security Manager exam with sample questions & answers, and free practice tests as well!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ISACA (CISM): Certified Information Security Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"name\":\"Testprep Training Tutorials\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\",\"name\":\"Testprep Training\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"contentUrl\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"width\":583,\"height\":153,\"caption\":\"Testprep Training\"},\"image\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ISACA (CISM): Certified Information Security Manager","description":"Prepare for the ISACA (CISM): Certified Information Security Manager exam with sample questions & answers, and free practice tests as well!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/","og_locale":"en_US","og_type":"article","og_title":"ISACA (CISM): Certified Information Security Manager","og_description":"Prepare for the ISACA (CISM): Certified Information Security Manager exam with sample questions & answers, and free practice tests as well!","og_url":"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/","og_site_name":"Testprep Training Tutorials","article_modified_time":"2022-10-31T13:20:21+00:00","og_image":[{"width":750,"height":400,"url":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2022\/10\/ISACA-CISM-Sample-Questions.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/","url":"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/","name":"ISACA (CISM): Certified Information Security Manager","isPartOf":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website"},"datePublished":"2022-10-31T13:17:10+00:00","dateModified":"2022-10-31T13:20:21+00:00","description":"Prepare for the ISACA (CISM): Certified Information Security Manager exam with sample questions & answers, and free practice tests as well!","breadcrumb":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/isaca-cism-certified-information-security-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.testpreptraining.ai\/tutorial\/"},{"@type":"ListItem","position":2,"name":"ISACA (CISM): Certified Information Security Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","name":"Testprep Training Tutorials","description":"","publisher":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization","name":"Testprep Training","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/","url":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","contentUrl":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","width":583,"height":153,"caption":"Testprep Training"},"image":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/58684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/comments?post=58684"}],"version-history":[{"count":4,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/58684\/revisions"}],"predecessor-version":[{"id":58690,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/58684\/revisions\/58690"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/media\/58685"}],"wp:attachment":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/media?parent=58684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/categories?post=58684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/tags?post=58684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}