100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISM (Certified Information Security manager) – Vocabulary Exam Study Guide

Rating
-
Sold
-
Pages
93
Grade
A+
Uploaded on
16-08-2024
Written in
2024/2025

CISM (Certified Information Security manager) – Vocabulary Exam Study Guide Acceptable interruption window - Answer️️ -Max time a system can be unavailable before compromising business objectives. Acceptable use policy - Answer️️ -Policy agreement between users and the organization. Defines approved range of use for access to a network or the Internet Access controls - Answer️️ -The processes, rules and deployment mechanisms that control access to information systems, resources and physical access to premises Access path - Answer️️ -Logical route an end user takes to access computerized information. Typically includes a route through the OS, telecommunications software, applications, and access controls. Access rights - Answer️️ -Permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 2 Accountability - Answer️️ -The ability to map a given activity or event back to the responsible party Action plan - Answer️️ -A plan of the steps necessary to achieve objectives Ad hoc - Answer️️ -Arbitrary approach, no formal plan or process Administrative controls - Answer️️ -Rules, procedures and practices that deal with operational effectiveness, efficiency and adherence to regulations and management policies. Adware - Answer️️ -Any software package that automatically plays, displays or downloads advertising material to a computer after the software is installed on it or while the application is being used. In most cases, this is done without any notification to the user or without the user's consent. This software may or maynot contain spyware. Advance Encryption Standard (AES) - Answer️️ -The international encryption standard that replaced 3DES. Algorithm - Answer️️ -A finite set of step-by-step instructions for a problem- solving or computation procedure, especially one that can be implemented by a computer. ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 3 Anomaly-Based Detection - Answer️️ -The process of comparing definitions of what activity is considered normal against observed events to identify significant deviations. This approach is used on some intrusion detection systems. Annual Loss Expectation (ALE) - Answer️️ -The total expected loss divided by the number of years in the forecast period yielding the average annual loss Alert situation - Answer️️ -The point in an emergency procedure when the elapsed time passes a threshold and the interruption is not resolved. The organization entering into an alert situation initiates a series of escalation steps. Alternate facilities - Answer️️ -Locations and infrastructures from which emergency or backup processes are executed, when the main premises are unavailable or destroyed. This includes other buildings, offices or data processing centers. Alternate process - Answer️️ -Automatic or manual processes designed and established to continue critical business processes from point-of-failure to return- to-normal Anonymous File Transfer Protocol (AFTP)* - Answer️️ -A method of downloading public files using the File Transfer Protocol (FTP). AFTP does not require users to identify themselves before accessing files from a particular server. ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM 4 In general, users enter the word "anonymous" when the host prompts for a username. Anything can be entered for the password, such as the user's e-mail address or simply the word "guest." Antivirus software - Answer️️ -An application software deployed at multiple points in an IT architecture. It is designed to detect and potentially eliminate virus code before damage is done, and repair or quarantine files that have already been infected Application Programming Interface (API) - Answer️️ -An application programming interface (API) is a source code-based specification

Show more Read less
Institution
CISM
Course
CISM











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISM
Course
CISM

Document information

Uploaded on
August 16, 2024
Number of pages
93
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM



CISM (Certified Information Security manager) –
Vocabulary Exam Study Guide


Acceptable interruption window - Answer✔️✔️-Max time a system can be

unavailable before compromising business objectives.


Acceptable use policy - Answer✔️✔️-Policy agreement between users and the

organization. Defines approved range of use for access to a network or the Internet


Access controls - Answer✔️✔️-The processes, rules and deployment mechanisms

that control access to information systems, resources and physical access to

premises


Access path - Answer✔️✔️-Logical route an end user takes to access computerized

information. Typically includes a route through the OS, telecommunications

software, applications, and access controls.


Access rights - Answer✔️✔️-Permission or privileges granted to users, programs or

workstations to create, change, delete or view data and files within a system, as

defined by rules established by data owners and the information security policy




1

,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Accountability - Answer✔️✔️-The ability to map a given activity or event back to

the responsible party


Action plan - Answer✔️✔️-A plan of the steps necessary to achieve objectives


Ad hoc - Answer✔️✔️-Arbitrary approach, no formal plan or process


Administrative controls - Answer✔️✔️-Rules, procedures and practices that deal

with operational effectiveness, efficiency and adherence to regulations and

management policies.


Adware - Answer✔️✔️-Any software package that automatically plays, displays or

downloads advertising material to a computer after the software is installed on it or

while the application is being used. In most cases, this is done without any

notification to the user or without the user's consent. This software may or maynot

contain spyware.


Advance Encryption Standard (AES) - Answer✔️✔️-The international encryption

standard that replaced 3DES.


Algorithm - Answer✔️✔️-A finite set of step-by-step instructions for a problem-

solving or computation procedure, especially one that can be implemented by a

computer.




2

,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


Anomaly-Based Detection - Answer✔️✔️-The process of comparing definitions of

what activity is considered normal against observed events to identify significant

deviations. This approach is used on some intrusion detection systems.


Annual Loss Expectation (ALE) - Answer✔️✔️-The total expected loss divided by

the number of years in the forecast period yielding the average annual loss


Alert situation - Answer✔️✔️-The point in an emergency procedure when the

elapsed time passes a threshold and the interruption is not resolved. The

organization entering into an alert situation initiates a series of escalation steps.


Alternate facilities - Answer✔️✔️-Locations and infrastructures from which

emergency or backup processes are executed, when the main premises are

unavailable or destroyed. This includes other buildings, offices or data processing

centers.


Alternate process - Answer✔️✔️-Automatic or manual processes designed and

established to continue critical business processes from point-of-failure to return-

to-normal


Anonymous File Transfer Protocol (AFTP)* - Answer✔️✔️-A method of

downloading public files using the File Transfer Protocol (FTP). AFTP does not

require users to identify themselves before accessing files from a particular server.



3

, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM


In general, users enter the word "anonymous" when the host prompts for a

username. Anything can be entered for the password, such as the user's e-mail

address or simply the word "guest."


Antivirus software - Answer✔️✔️-An application software deployed at multiple

points in an IT architecture. It is designed to detect and potentially eliminate virus

code before damage is done, and repair or quarantine files that have already been

infected


Application Programming Interface (API) - Answer✔️✔️-An application

programming interface (API) is a source code-based specification intended to be

used as an interface by software components to communicate with each other.


Application controls - Answer✔️✔️-The policies, procedures and activities designed

to provide reasonable assurance that objectives relevant to a given automated

solution (application) are achieved


Application layers - Answer✔️✔️-In the Open Systems Interconnection (OSI)

communications model, the application layer provides services for an application

program to ensure that effective communication with another application program

in a network is possible. The application layer is not the application that is doing

the communication; it is a service layer that provides these services.




4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
OliviaWest Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
105
Member since
1 year
Number of followers
17
Documents
8528
Last sold
6 days ago
Pure Orchid Haven.

All Documents,and package deals offered by seller Olivia West.

2.8

22 reviews

5
6
4
2
3
4
2
1
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions