100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISM - Information Security Program Management Practice Questions and Answers (100% Pass)

Rating
-
Sold
-
Pages
28
Grade
A+
Uploaded on
16-08-2024
Written in
2024/2025

CISM - Information Security Program Management Practice Questions and Answers (100% Pass) Access Control - Answer️️ -The processes, rules and deployment mechanisms that control access to information systems, resources and physical access to premises Access Path - Answer️️ -The logical route that an end user takes to access computerized information. Access Rights - Answer️️ -The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy Accountability - Answer️️ -The ability to map a given activity or event back to the responsible party ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 2 Administrative Control - Answer️️ -The rules, procedures and practices dealing with operational effectiveness, efficiency and adherence to regulations and management policies. Advance Encryption Standard (AES) - Answer️️ -A public algorithm that supports keys from 128 bits to 256 bits in size Advance Persistent Threat (APT) - Answer️️ -An adversary that possesses sophisticated levels of expertise and significant resources, which allow them to create opportunities to achieve their objectives by using multiple attack vectors, e.g., cyber, physical, and deception. These objectives typically include establishing and extending footholds within the information technology infrastructure of the targeted organizations for purposes of exfiltrating information; undermining or impeding critical aspects of a mission themselves to carry out these objectives in the future. Algorithm - Answer️️ -A finite set of well-defined, unambiguous rules for the solution of a problem in a finite number of steps, it is a sequence of operational actions that lead to a desired goal and is the basic building block of a program Anomaly Detection - Answer️️ -Detection on the basis of whether the system activity matches that defined as abnormal ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 3 Antimalware - Answer️️ -A widely used technology to prevent, detect and remove many categories of malware, including computer viruses, worms, Trojans, keyloggers, malicious browser plug-ins, adware and spyware Antiphishing - Answer️️ -Software that identifies phishing content and attempts to block the content or warn the user about the suspicious nature of the content Antivirus Software - Answer️️ -An application software deployed at multiple points in an IT architecture. It is designed to detect and potentially eliminate virus code before damage is done and repair or quarantine files that have already been infected. Application Controls - Answer️️ -The policies, procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved. Application Programming Interface (API) - Answer️️ -A set of routines, protocols and tools referred to as building blocks used in business application software development Application Service Provider (ASP) - Answer️️ -Also known as managed service provider (MSP), it deploys, hosts and manages access to a packaged application to multiple parties from a centrally managed facility. ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 4 Architecture - Answer️️ -Description of the fundamental underlying design of the components of the business system, or of one element of the business system (e.g., technology), the relationships among them, and the manner in which they support enterprise objectives Asymmetric Key (Public Key) - Answer️️ -A cipher technique in which different cryptographic keys are used to encrypt and decrypt a message Attack Vector - Answer️️ -A path or route used by the adversary to gain access to the target (asset) Audit Trail - Answer️️ -Data in the form of a logical path linking a sequence of events, used to trace the transactions that have affected the contents of a record Authentication - Answer️️ -The act of verifying identity, i.e., user, system The act of verifying the identity of a user, the user's eligibility to access computerized information Authorization - Answer️️ -The process of determining if the end user is permitted to have access to an information asset or the information syst

Show more Read less
Institution
CISM
Course
CISM










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISM
Course
CISM

Document information

Uploaded on
August 16, 2024
Number of pages
28
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM




CISM - Information Security Program
Management Practice Questions and
Answers (100% Pass)

Access Control - Answer✔️✔️-The processes, rules and deployment mechanisms

that control access to information systems, resources and physical access to

premises


Access Path - Answer✔️✔️-The logical route that an end user takes to access

computerized information.


Access Rights - Answer✔️✔️-The permission or privileges granted to users,

programs or workstations to create, change, delete or view data and files within a

system, as defined by rules established by data owners and the information security

policy


Accountability - Answer✔️✔️-The ability to map a given activity or event back to

the responsible party




1

,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Administrative Control - Answer✔️✔️-The rules, procedures and practices dealing

with operational effectiveness, efficiency and adherence to regulations and

management policies.


Advance Encryption Standard (AES) - Answer✔️✔️-A public algorithm that

supports keys from 128 bits to 256 bits in size


Advance Persistent Threat (APT) - Answer✔️✔️-An adversary that possesses

sophisticated levels of expertise and significant resources, which allow them to

create opportunities to achieve their objectives by using multiple attack vectors,

e.g., cyber, physical, and deception. These objectives typically include establishing

and extending footholds within the information technology infrastructure of the

targeted organizations for purposes of exfiltrating information; undermining or

impeding critical aspects of a mission themselves to carry out these objectives in

the future.


Algorithm - Answer✔️✔️-A finite set of well-defined, unambiguous rules for the

solution of a problem in a finite number of steps, it is a sequence of operational

actions that lead to a desired goal and is the basic building block of a program


Anomaly Detection - Answer✔️✔️-Detection on the basis of whether the system

activity matches that defined as abnormal




2

, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Antimalware - Answer✔️✔️-A widely used technology to prevent, detect and

remove many categories of malware, including computer viruses, worms, Trojans,

keyloggers, malicious browser plug-ins, adware and spyware


Antiphishing - Answer✔️✔️-Software that identifies phishing content and attempts

to block the content or warn the user about the suspicious nature of the content


Antivirus Software - Answer✔️✔️-An application software deployed at multiple

points in an IT architecture. It is designed to detect and potentially eliminate virus

code before damage is done and repair or quarantine files that have already been

infected.


Application Controls - Answer✔️✔️-The policies, procedures and activities designed

to provide reasonable assurance that objectives relevant to a given automated

solution (application) are achieved.


Application Programming Interface (API) - Answer✔️✔️-A set of routines, protocols

and tools referred to as building blocks used in business application software

development


Application Service Provider (ASP) - Answer✔️✔️-Also known as managed service

provider (MSP), it deploys, hosts and manages access to a packaged application to

multiple parties from a centrally managed facility.



3

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
OliviaWest Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
105
Member since
1 year
Number of followers
17
Documents
8528
Last sold
6 days ago
Pure Orchid Haven.

All Documents,and package deals offered by seller Olivia West.

2.8

22 reviews

5
6
4
2
3
4
2
1
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions