CISM - Information Security Program
Management Practice Questions and
Answers (100% Pass)
Access Control - Answer✔️✔️-The processes, rules and deployment mechanisms
that control access to information systems, resources and physical access to
premises
Access Path - Answer✔️✔️-The logical route that an end user takes to access
computerized information.
Access Rights - Answer✔️✔️-The permission or privileges granted to users,
programs or workstations to create, change, delete or view data and files within a
system, as defined by rules established by data owners and the information security
policy
Accountability - Answer✔️✔️-The ability to map a given activity or event back to
the responsible party
1
,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
Administrative Control - Answer✔️✔️-The rules, procedures and practices dealing
with operational effectiveness, efficiency and adherence to regulations and
management policies.
Advance Encryption Standard (AES) - Answer✔️✔️-A public algorithm that
supports keys from 128 bits to 256 bits in size
Advance Persistent Threat (APT) - Answer✔️✔️-An adversary that possesses
sophisticated levels of expertise and significant resources, which allow them to
create opportunities to achieve their objectives by using multiple attack vectors,
e.g., cyber, physical, and deception. These objectives typically include establishing
and extending footholds within the information technology infrastructure of the
targeted organizations for purposes of exfiltrating information; undermining or
impeding critical aspects of a mission themselves to carry out these objectives in
the future.
Algorithm - Answer✔️✔️-A finite set of well-defined, unambiguous rules for the
solution of a problem in a finite number of steps, it is a sequence of operational
actions that lead to a desired goal and is the basic building block of a program
Anomaly Detection - Answer✔️✔️-Detection on the basis of whether the system
activity matches that defined as abnormal
2
, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
Antimalware - Answer✔️✔️-A widely used technology to prevent, detect and
remove many categories of malware, including computer viruses, worms, Trojans,
keyloggers, malicious browser plug-ins, adware and spyware
Antiphishing - Answer✔️✔️-Software that identifies phishing content and attempts
to block the content or warn the user about the suspicious nature of the content
Antivirus Software - Answer✔️✔️-An application software deployed at multiple
points in an IT architecture. It is designed to detect and potentially eliminate virus
code before damage is done and repair or quarantine files that have already been
infected.
Application Controls - Answer✔️✔️-The policies, procedures and activities designed
to provide reasonable assurance that objectives relevant to a given automated
solution (application) are achieved.
Application Programming Interface (API) - Answer✔️✔️-A set of routines, protocols
and tools referred to as building blocks used in business application software
development
Application Service Provider (ASP) - Answer✔️✔️-Also known as managed service
provider (MSP), it deploys, hosts and manages access to a packaged application to
multiple parties from a centrally managed facility.
3