CISM Questions and Answers with Complete and Certified Solutions
CISM Questions and Answers with Complete and Certified Solutions Acceptable interruption window Amount of time that an organization deems acceptable for a system to be unavailable before the organization's business objectives are compromised. This is ultimately about risk management. This should be set before an interruption occurs. Acceptable use policy A policy set by organizations on proper system usage. An agreement between the organization and client on what is acceptable performance and expectation of behavior and activity before gaining access to the system. Part of the overall security documentation infrastructure. Access controls Policies and procedures that determine the permissions, rights, and privileges of users to data, information systems, or even the physical building of an organization. Goal: helps to ensure that only people who are authenticated and authorized can access resources. Access path When a user requests data, the route that a computer takes to access it. Usually through the operating system, telecommunications software, application software, and the access control system. Access rights The permissions granted to users or programs to access, create, view, modify, or delete data or files within a system. Determined by data owners and information security policy. Accountability Tracking online activities of a user so they are held accountable for the actions they take on the data. It relies on effective identification and authentication. Usually used in audit logs. Address Resolution Protocol (ARP) A basic connectivity protocol. ARP resolves IPv4 addresses to media access control (MAC) addresses (physical address of the computer). Administrative control The policies and procedures defined by an organization's security policy that deals with operational effectiveness, efficiency, and adherence to regulations and management policies. Examples of these can include: policies, hiring practices, background checks, classifying and labeling data, security awareness and training efforts, personnel controls, and testing. Advance encryption standard (AES) An encryption standard used in symmetric encryption. Replaced 3DES. It is fast, efficient, and strong. Encryption ensures the confidentiality prong of the CIA triad. Alert situation When a service interruption has reached a threshold and an organization can no longer cope with the outage, causing the organization to escalate into an alert situation. Algorithm A mathematical procedure, a finite set of rules and step-by-step instructions, especially one that can be followed by a computer. In cybersecurity, we usually talk about encryption algorithms. Alternate facilities Other buildings or sites that are used in case of an emergency or disaster situation in which data availability is decreased or lost. This includes hot sites, warm site, cold sites, and mobile sites, that can be activated as part of an emergency protocol. The level of preparedness varies from completely configured with hardware and software and backup servers, to just physical buildings. Hot sites can be ready within several minutes to an hour of need. Alternate process Steps used to continue critical business function from point-of-failure to return-to-normal. Used after a disruption of service. Annual loss expectancy (ALE) ALE is used in quantitative risk assessment, which uses a specific monetary amount to manage risk. The ALE is the Single loss expectancy (SLE) x Annual rate of occurrence (ARO). Anomaly detection The process of examining the system for any deviation from normal. Anonymous File Transfer Protocol (AFTP) A way of do
Written for
- Institution
- CISM - Certified Information Security Manager
- Course
- CISM - Certified Information Security Manager
Document information
- Uploaded on
- October 7, 2023
- Number of pages
- 66
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cism questions and answers with complete and certi
Also available in package deal