100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ISACA CISM 2-15 Questions with 100% Correct Well Explained Answers

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
16-08-2024
Written in
2024/2025

ISACA CISM 2-15 Questions with 100% Correct Well Explained Answers Questions Answers and Explanations Decisions regarding information security are best supported by - Answer️️ - effective metrics effective metrics are essential to provide information needed to make decisions. Metrics are quantifiable entity that allows the measurement of the achievement of a process goal. A project manager is developing a developer portal and request that the security manager assign a public IP address so that it can be accessed by in house staff and by external consultants outside the organization's local area network (LAN). What should the security manager do first? - Answer️️ -understand the business requirements of the portal you cannot make an uninformed decision. Learn and understand the business requirement first! Vulernability accessment and Intrustion detection systems (IDS) are subsequent tasks ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 2 Which of the following should be understood before defining risk management strategies? - Answer️️ -organizational objectives and risk appetite Analyze the org's objectives and risk appetite, then define a risk mgt framework based on the analysis; Some org's may accept known risks; Primary concern of an info security manager documenting a formal data retention policy is - Answer️️ -Business Requirements! Best practices are useful, but not primary; Legislative or regulatory are only primary if they are part of the business requirments the maturity of an info security program is primarily the result of - Answer️️ -An effective info security strategy; Strategy provides clear direction on how the organization will attain security outcomes and directed by senior mgt; Other note: Assess and analyzing risk is required to develop a strategy; provide info needed to develop it, but will not define the scope and charter of the security program; Security architecture is a part of a larger security plan ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 3 Applicability statement is part of strategy implementation using ISO 27001 or 27002 after determining the scope & responsibilities of the program which of the following best supports the principle of security proportionality? - Answer️️ -Asset Classification! Classification provides the basis for protecting resources in relation to their importance to the organization; More important assets get proportionally higher level of protection An Ownership schema is one step in achieving proportionality, but other steps must also occur Resource dependency analysis can reveal the level of protection afforded a particular system, but is unrelated to protection of assets! An organization's security awareness program should focus on which of the following? - Answer️️ -An organizations security awareness prog

Show more Read less
Institution
CISM
Course
CISM









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISM
Course
CISM

Document information

Uploaded on
August 16, 2024
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM




ISACA CISM 2-15 Questions with 100%
Correct Well Explained Answers

Questions Answers and Explanations


Decisions regarding information security are best supported by - Answer✔️✔️-

effective metrics

effective metrics are essential to provide information needed to make decisions.

Metrics are quantifiable entity that allows the measurement of the achievement of a

process goal.

A project manager is developing a developer portal and request that the security

manager assign a public IP address so that it can be accessed by in house staff and

by external consultants outside the organization's local area network (LAN). What

should the security manager do first? - Answer✔️✔️-understand the business

requirements of the portal

you cannot make an uninformed decision. Learn and understand the business

requirement first! Vulernability accessment and Intrustion detection systems (IDS)

are subsequent tasks




1

, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Which of the following should be understood before defining risk management

strategies? - Answer✔️✔️-organizational objectives and risk appetite Analyze the

org's objectives and risk appetite, then define a risk mgt framework based on the

analysis; Some org's may accept known risks;

Primary concern of an info security manager documenting a formal data retention

policy is - Answer✔️✔️-Business Requirements!




Best practices are useful, but not primary; Legislative or regulatory are only

primary if they are part of the business requirments


the maturity of an info security program is primarily the result of - Answer✔️✔️-An

effective info security strategy;

Strategy provides clear direction on how the organization will attain security

outcomes and directed by senior mgt;

Other note:

Assess and analyzing risk is required to develop a strategy; provide info needed to

develop it, but will not define the scope and charter of the security program;

Security architecture is a part of a larger security plan




2

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
OliviaWest Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
105
Member since
1 year
Number of followers
17
Documents
8528
Last sold
6 days ago
Pure Orchid Haven.

All Documents,and package deals offered by seller Olivia West.

2.8

22 reviews

5
6
4
2
3
4
2
1
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions