100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISM Exam Study Guide with Complete Solutions

Rating
-
Sold
-
Pages
64
Grade
A+
Uploaded on
16-08-2024
Written in
2024/2025

CISM Exam Study Guide with Complete Solutions Acceptable interruption window - Answer️️ -Amount of time that an organization deems acceptable for a system to be unavailable before the organization's business objectives are compromised. This is ultimately about risk management. This should be set before an interruption occurs. Acceptable use policy - Answer️️ -A policy set by organizations on proper system usage. An agreement between the organization and client on what is acceptable performance and expectation of behavior and activity before gaining access to the system. Part of the overall security documentation infrastructure. Access controls - Answer️️ -Policies and procedures that determine the permissions, rights, and privileges of users to data, information systems, or even the physical building of an organization. Goal: helps to ensure that only people who are authenticated and authorized can access resources. Access path - Answer️️ -When a user requests data, the route that a computer takes to access it. Usually through the operating system, telecommunications software, application software, and the access control system. ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 2 Access rights - Answer️️ -The permissions granted to users or programs to access, create, view, modify, or delete data or files within a system. Determined by data owners and information security policy. Accountability - Answer️️ -Tracking online activities of a user so they are held accountable for the actions they take on the data. It relies on effective identification and authentication. Usually used in audit logs. Address Resolution Protocol (ARP) - Answer️️ -A basic connectivity protocol. ARP resolves IPv4 addresses to media access control (MAC) addresses (physical address of the computer). Administrative control - Answer️️ -The policies and procedures defined by an organization's security policy that deals with operational effectiveness, efficiency, and adherence to regulations and management policies. Examples of these can include: policies, hiring practices, background checks, classifying and labeling data, security awareness and training efforts, personnel controls, and testing. Advance encryption standard (AES) - Answer️️ -An encryption standard used in symmetric encryption. Replaced 3DES. It is fast, efficient, and strong. Encryption ensures the confidentiality prong of the CIA triad. ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 3 Alert situation - Answer️️ -When a service interruption has reached a threshold and an organization can no longer cope with the outage, causing the organization to escalate into an alert situation. Algorithm - Answer️️ -A mathematical procedure, a finite set of rules and step- by-step instructions, especially one that can be followed by a computer. In cybersecurity, we usually talk about encryption algorithms. Alternate facilities - Answer️️ -Other buildings or sites that are used in case of an emergency or disaster situation in which data availability is decreased or lost. This includes hot sites, warm site, cold sites, and mobile sites, that can be activated as part of an emergency protocol. The level of preparedness varies from completely configured with hardware and software and backup servers, to just physical buildings. Hot sites can be ready within several minutes to an hour of need. Alternate process - Answer️️ -Steps used to continue critical business function from point-of-failure to return-to-normal. Used after a disruption of service. Annual loss expectancy (ALE) - Answer️️ -ALE is used in quantitative risk assessment, which uses a specific monetary amount to manage risk. The ALE is the Single loss expectancy (SLE) x Annual rate of occurrence (ARO). ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 4 Anomaly detection - Answer️️ -The process of examining the system for any deviation from normal. Anonymous File Transfer Protocol (AFTP) - Answer️️ -A way of downloading public files using FTP. It does not require the user to identify themselves before accessing files. Instead, when prompted, the user can type "anonymous" as a username and "guest" as a password. Often times, an AFTP site will not ask for a username and password. This is a security concern, as these sites might not be protected. Antivirus software - Answer️️ -Software installed on many points in the IT infrastructure that protects and can eliminate virus code bef

Show more Read less
Institution
CISM
Course
CISM











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISM
Course
CISM

Document information

Uploaded on
August 16, 2024
Number of pages
64
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM



CISM Exam Study Guide with Complete Solutions

Acceptable interruption window - Answer✔️✔️-Amount of time that an

organization deems acceptable for a system to be unavailable before the

organization's business objectives are compromised. This is ultimately about risk

management. This should be set before an interruption occurs.


Acceptable use policy - Answer✔️✔️-A policy set by organizations on proper

system usage. An agreement between the organization and client on what is

acceptable performance and expectation of behavior and activity before gaining

access to the system. Part of the overall security documentation infrastructure.


Access controls - Answer✔️✔️-Policies and procedures that determine the

permissions, rights, and privileges of users to data, information systems, or even

the physical building of an organization. Goal: helps to ensure that only people

who are authenticated and authorized can access resources.


Access path - Answer✔️✔️-When a user requests data, the route that a computer

takes to access it. Usually through the operating system, telecommunications

software, application software, and the access control system.




1

,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Access rights - Answer✔️✔️-The permissions granted to users or programs to

access, create, view, modify, or delete data or files within a system. Determined by

data owners and information security policy.


Accountability - Answer✔️✔️-Tracking online activities of a user so they are held

accountable for the actions they take on the data. It relies on effective identification

and authentication. Usually used in audit logs.


Address Resolution Protocol (ARP) - Answer✔️✔️-A basic connectivity protocol.

ARP resolves IPv4 addresses to media access control (MAC) addresses (physical

address of the computer).


Administrative control - Answer✔️✔️-The policies and procedures defined by an

organization's security policy that deals with operational effectiveness, efficiency,

and adherence to regulations and management policies. Examples of these can

include: policies, hiring practices, background checks, classifying and labeling

data, security awareness and training efforts, personnel controls, and testing.


Advance encryption standard (AES) - Answer✔️✔️-An encryption standard used in

symmetric encryption. Replaced 3DES. It is fast, efficient, and strong. Encryption

ensures the confidentiality prong of the CIA triad.




2

,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Alert situation - Answer✔️✔️-When a service interruption has reached a threshold

and an organization can no longer cope with the outage, causing the organization to

escalate into an alert situation.


Algorithm - Answer✔️✔️-A mathematical procedure, a finite set of rules and step-

by-step instructions, especially one that can be followed by a computer. In

cybersecurity, we usually talk about encryption algorithms.


Alternate facilities - Answer✔️✔️-Other buildings or sites that are used in case of an

emergency or disaster situation in which data availability is decreased or lost. This

includes hot sites, warm site, cold sites, and mobile sites, that can be activated as

part of an emergency protocol. The level of preparedness varies from completely

configured with hardware and software and backup servers, to just physical

buildings. Hot sites can be ready within several minutes to an hour of need.


Alternate process - Answer✔️✔️-Steps used to continue critical business function

from point-of-failure to return-to-normal. Used after a disruption of service.


Annual loss expectancy (ALE) - Answer✔️✔️-ALE is used in quantitative risk

assessment, which uses a specific monetary amount to manage risk. The ALE is the

Single loss expectancy (SLE) x Annual rate of occurrence (ARO).




3

, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Anomaly detection - Answer✔️✔️-The process of examining the system for any

deviation from normal.


Anonymous File Transfer Protocol (AFTP) - Answer✔️✔️-A way of downloading

public files using FTP. It does not require the user to identify themselves before

accessing files. Instead, when prompted, the user can type "anonymous" as a

username and "guest" as a password. Often times, an AFTP site will not ask for a

username and password. This is a security concern, as these sites might not be

protected.


Antivirus software - Answer✔️✔️-Software installed on many points in the IT

infrastructure that protects and can eliminate virus code before damage occurs. Can

repair or quarantine infected files.


Application controls - Answer✔️✔️-Policies and procedures that ensure that

objectives of system applications are achieved.


Application layer - Answer✔️✔️-The top layer of the OSI stack, this is a service

layer that allows application programs to communicate with each other. The

application itself is not located within this level. The protocols and services

required to transmit files, exchange messages, and connect to remote terminals are




4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
OliviaWest Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
105
Member since
1 year
Number of followers
17
Documents
8528
Last sold
6 days ago
Pure Orchid Haven.

All Documents,and package deals offered by seller Olivia West.

2.8

22 reviews

5
6
4
2
3
4
2
1
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions