100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISM Exam Study Guide with Complete Solutions

Rating
-
Sold
-
Pages
97
Grade
A+
Uploaded on
16-08-2024
Written in
2024/2025

CISM Exam Study Guide with Complete Solutions One - Answer️️ -One Two - Answer️️ -Two Acceptable use policy - Answer️️ -A policy that establishes an agreement between users and the organization, and defines for all parties' ranges of use that are approved before gaining access to a network or the Internet Access controls - Answer️️ -The processes, rules and deployment mechanisms that control access to information systems, resources and physical access to premises Access path - Answer️️ -The logical route that an end user takes to access computerized information. Typically, it includes a route through the operating system, telecommunications software, selected application software and the access control system. Access rights - Answer️️ -The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 2 Accountability - Answer️️ -The ability to map a given activity or event back to the responsible party Action plan - Answer️️ -A plan for the steps necessary to navigate the roadmap to achieve objectives Ad hoc - Answer️️ -Arbitrary approach, no formal plan or process Adware - Answer️️ -Any software package that automatically plays, displays or downloads advertising material to a computer after the software is installed on it or while the application is being used. In most cases, this is done without any notification to the user or without the user's consent. The term adware may also refer to software that displays advertisements, whether or not it does so with the user's consent; such programs display advertisements as an alternative to shareware registration fees. These are classified as adware in the sense of advertising- supported software, but not as spyware. Adware in this form does not operate surreptitiously or mislead the user, and provides the user with a specific service. Advance Encryption Standard (AES) - Answer️️ -The international encryption standard that replaced 3DES. ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 3 Algorithm - Answer️️ -A finite set of step-by-step instructions for a problem- solving or computation procedure, especially one that can be implemented by a computer. Anomaly-Based Detection - Answer️️ -The process of comparing definitions of what activity is considered normal against observed events to identify significant deviations. This approach is used on some intrusion detection systems. Annual Loss Expectation (ALE) - Answer️️ -The total expected loss divided by the number of years in the forecast period yielding the average annual loss Alert situation - Answer️️ -The point in an emergency procedure when the elapsed time passes a threshold and the interruption is not resolved. The organization entering into an alert situation initiates a series of escalation steps. Alternate facilities - Answer️️ -Locations and infrastructures from which emergency or backup processes are executed, when the main premises are unavailable or destroyed. This includes other buildings, offices or data processing centers. Alternate process - Answer️️ -Automatic or manual processes designed and established to continue critical business processes from point-of-failure to return- to-normal ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 4 Anonymous File Transfer Protocol (AFTP) - Answer️️ -A method of downloading public files using the File Transfer Protocol (FTP). AFTP does not require users to identify themselves before accessing files from a particular server. In general, users enter the word "anonymous" when the host prompts for a username. Anything can be entered for the password, such as the user's e-mail address or simply the word "guest." In many cases, an AFTP site will not prompt a user for a name and password. Antivirus software - Answer️️ -An application software deployed at multiple points in an IT architecture. It is designed to detect and potentially eliminate virus code before damage is done, and repair or quarantine files that have already been infected Application Programming Interface (API) - Answer️️ -An application programming interface (API) is a source code-based specification intended to be used as an interface by software components to communicate with each other. Application controls - Answer️️ -The policies, procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 5 Application layers - Answer️️ -In the Open Systems Interconnection (OSI) communications model, the application layer provides services for an application program to ensure that effective communication with another application program in a network is possible. The application layer is not the application that is doing the communication; it is a service layer that provides these services. Application service provider (ASP) - Answer️️ -Also known as managed service provider (MSP), it deploys, hosts and manages access to a packaged application to multiple parties from a centrally managed facility. The applications are delivered over networks on a subscription basis. Architecture - Answer️️ -Description of the fundamental underlying design of the components of the business system, or of one element of the business system (e.g., technology), the relationships among them, and the manner in which they support the organization's objectives ARP (see also RARP) - Answer️️ -ARP defines the exchanges between network interfaces connected to an Ethernet media segment in order to map an IP address to a link layer address on demand. Assurance - Answer️️ -The grounds for confidence that the set of intended security controls in an information system are effective in their application. ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 6 Assurance Process Integration - Answer️️ -Integration of organizational assurance processes to achieve greater efficiencies and counter typical silo effects. Assymetric encryption - Answer️️ -A cryptographic key that may be widely published and is used to enable the operation of an asymmetric cr

Show more Read less
Institution
CISM
Course
CISM











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISM
Course
CISM

Document information

Uploaded on
August 16, 2024
Number of pages
97
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM



CISM Exam Study Guide with Complete Solutions

One - Answer✔️✔️-One


Two - Answer✔️✔️-Two


Acceptable use policy - Answer✔️✔️-A policy that establishes an agreement

between users and the organization, and defines for all parties' ranges of use that

are approved before gaining access to a network or the Internet


Access controls - Answer✔️✔️-The processes, rules and deployment mechanisms

that control access to information systems, resources and physical access to

premises


Access path - Answer✔️✔️-The logical route that an end user takes to access

computerized information. Typically, it includes a route through the operating

system, telecommunications software, selected application software and the access

control system.


Access rights - Answer✔️✔️-The permission or privileges granted to users,

programs or workstations to create, change, delete or view data and files within a

system, as defined by rules established by data owners and the information security

policy


1

,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Accountability - Answer✔️✔️-The ability to map a given activity or event back to

the responsible party


Action plan - Answer✔️✔️-A plan for the steps necessary to navigate the roadmap to

achieve objectives


Ad hoc - Answer✔️✔️-Arbitrary approach, no formal plan or process


Adware - Answer✔️✔️-Any software package that automatically plays, displays or

downloads advertising material to a computer after the software is installed on it or

while the application is being used. In most cases, this is done without any

notification to the user or without the user's consent. The term adware may also

refer to software that displays advertisements, whether or not it does so with the

user's consent; such programs display advertisements as an alternative to shareware

registration fees. These are classified as adware in the sense of advertising-

supported software, but not as spyware. Adware in this form does not operate

surreptitiously or mislead the user, and provides the user with a specific service.


Advance Encryption Standard (AES) - Answer✔️✔️-The international encryption

standard that replaced 3DES.




2

,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Algorithm - Answer✔️✔️-A finite set of step-by-step instructions for a problem-

solving or computation procedure, especially one that can be implemented by a

computer.


Anomaly-Based Detection - Answer✔️✔️-The process of comparing definitions of

what activity is considered normal against observed events to identify significant

deviations. This approach is used on some intrusion detection systems.


Annual Loss Expectation (ALE) - Answer✔️✔️-The total expected loss divided by

the number of years in the forecast period yielding the average annual loss


Alert situation - Answer✔️✔️-The point in an emergency procedure when the

elapsed time passes a threshold and the interruption is not resolved. The

organization entering into an alert situation initiates a series of escalation steps.


Alternate facilities - Answer✔️✔️-Locations and infrastructures from which

emergency or backup processes are executed, when the main premises are

unavailable or destroyed. This includes other buildings, offices or data processing

centers.


Alternate process - Answer✔️✔️-Automatic or manual processes designed and

established to continue critical business processes from point-of-failure to return-

to-normal



3

, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Anonymous File Transfer Protocol (AFTP) - Answer✔️✔️-A method of

downloading public files using the File Transfer Protocol (FTP). AFTP does not

require users to identify themselves before accessing files from a particular server.

In general, users enter the word "anonymous" when the host prompts for a

username. Anything can be entered for the password, such as the user's e-mail

address or simply the word "guest." In many cases, an AFTP site will not prompt a

user for a name and password.


Antivirus software - Answer✔️✔️-An application software deployed at multiple

points in an IT architecture. It is designed to detect and potentially eliminate virus

code before damage is done, and repair or quarantine files that have already been

infected


Application Programming Interface (API) - Answer✔️✔️-An application

programming interface (API) is a source code-based specification intended to be

used as an interface by software components to communicate with each other.


Application controls - Answer✔️✔️-The policies, procedures and activities designed

to provide reasonable assurance that objectives relevant to a given automated

solution (application) are achieved




4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
OliviaWest Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
105
Member since
1 year
Number of followers
17
Documents
8528
Last sold
6 days ago
Pure Orchid Haven.

All Documents,and package deals offered by seller Olivia West.

2.8

22 reviews

5
6
4
2
3
4
2
1
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions