100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISM Questions and Answers with Complete and Certified Solutions

Rating
-
Sold
-
Pages
66
Grade
A+
Uploaded on
07-10-2023
Written in
2023/2024

CISM Questions and Answers with Complete and Certified Solutions Acceptable interruption window Amount of time that an organization deems acceptable for a system to be unavailable before the organization's business objectives are compromised. This is ultimately about risk management. This should be set before an interruption occurs. Acceptable use policy A policy set by organizations on proper system usage. An agreement between the organization and client on what is acceptable performance and expectation of behavior and activity before gaining access to the system. Part of the overall security documentation infrastructure. Access controls Policies and procedures that determine the permissions, rights, and privileges of users to data, information systems, or even the physical building of an organization. Goal: helps to ensure that only people who are authenticated and authorized can access resources. Access path When a user requests data, the route that a computer takes to access it. Usually through the operating system, telecommunications software, application software, and the access control system. Access rights The permissions granted to users or programs to access, create, view, modify, or delete data or files within a system. Determined by data owners and information security policy. Accountability Tracking online activities of a user so they are held accountable for the actions they take on the data. It relies on effective identification and authentication. Usually used in audit logs. Address Resolution Protocol (ARP) A basic connectivity protocol. ARP resolves IPv4 addresses to media access control (MAC) addresses (physical address of the computer). Administrative control The policies and procedures defined by an organization's security policy that deals with operational effectiveness, efficiency, and adherence to regulations and management policies. Examples of these can include: policies, hiring practices, background checks, classifying and labeling data, security awareness and training efforts, personnel controls, and testing. Advance encryption standard (AES) An encryption standard used in symmetric encryption. Replaced 3DES. It is fast, efficient, and strong. Encryption ensures the confidentiality prong of the CIA triad. Alert situation When a service interruption has reached a threshold and an organization can no longer cope with the outage, causing the organization to escalate into an alert situation. Algorithm A mathematical procedure, a finite set of rules and step-by-step instructions, especially one that can be followed by a computer. In cybersecurity, we usually talk about encryption algorithms. Alternate facilities Other buildings or sites that are used in case of an emergency or disaster situation in which data availability is decreased or lost. This includes hot sites, warm site, cold sites, and mobile sites, that can be activated as part of an emergency protocol. The level of preparedness varies from completely configured with hardware and software and backup servers, to just physical buildings. Hot sites can be ready within several minutes to an hour of need. Alternate process Steps used to continue critical business function from point-of-failure to return-to-normal. Used after a disruption of service. Annual loss expectancy (ALE) ALE is used in quantitative risk assessment, which uses a specific monetary amount to manage risk. The ALE is the Single loss expectancy (SLE) x Annual rate of occurrence (ARO). Anomaly detection The process of examining the system for any deviation from normal. Anonymous File Transfer Protocol (AFTP) A way of do

Show more Read less
Institution
CISM - Certified Information Security Manager
Course
CISM - Certified Information Security Manager











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISM - Certified Information Security Manager
Course
CISM - Certified Information Security Manager

Document information

Uploaded on
October 7, 2023
Number of pages
66
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StellarScores Western Governers University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1899
Member since
2 year
Number of followers
864
Documents
21000
Last sold
19 hours ago
Your Academic Hub: Documents, Study Guides, Summaries, Essays, and Exclusive Package Deals.

Welcome to my comprehensive academic resource store! At my online hub, I offer a vast array of meticulously crafted documents, study guides, summaries, and essays to support your educational journey. I understand the value of accuracy and completeness, which is why all my materials are verified and kept up-to-date with the latest versions. But that's not all! I also offer exclusive package deals and bundles to provide you with cost-effective solutions for your academic needs. Whether you're a student looking for study aids or seeking in-depth knowledge, my store is your one-stop destination for reliable, top-quality materials that can propel your learning experience to new heights. Explore my offerings and unlock the keys to academic success today!

Read more Read less
4.0

434 reviews

5
234
4
78
3
60
2
24
1
38

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions