100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CISM Certified Information Security Manager Exam

Puntuación
-
Vendido
-
Páginas
6
Grado
A+
Subido en
17-01-2025
Escrito en
2024/2025

CISM Certified Information Security Manager Exam

Institución
Computer Information Systems
Grado
Computer information systems









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Computer information systems
Grado
Computer information systems

Información del documento

Subido en
17 de enero de 2025
Número de páginas
6
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CISM Certified Information Security
Manager Exam
A fence - ANSWER-An example of a preventative control is:

A hash function creates a fixed length hash regardless of input message length -
ANSWER-What is the length of a digest created by a hash function?

a person that takes ownership of each activity - ANSWER-The implementation of a
security program requires:

A security awareness program - ANSWER-The most effective tool a security
department has is:

Accreditation - ANSWER-Ensuring that a system is not implemented until it has been
formally approved by a senior manager is part of:

Address the ley distribution problems of asymmetric encryption - ANSWER-A primary
reason for the development of public key cryptography was to:

Administrative controls - ANSWER-An information classification policy is what form of
control?

Alignment with the goals and objectives of the organization - ANSWER-The foundation
of an information security program is:

an enterprise = wide approach to security architecture - ANSWER-The Sherwood
Applied Business Security Architecture SABSA is primarily concerned with

Any event or action that could cause harm to the organization - ANSWER-What is a
threat?

Assist in the management of a complex project by breaking it into individual steps -
ANSWER-The purpose of a life cycle as used in the Systems Development Life Cycle
SDLC is to:

At each stage starting at project initiation - ANSWER-At which stage of a project should
risk management be performed?

business assurance - ANSWER-Audit is a form of:

Certification - ANSWER-The testing and evaluation of the security of a system made in
support of the decision to implement the system is known as

, Change control - ANSWER-To ensure the quality and adherence to standards for a
modification to a system the organization enforces:

Compare the current state of security with the desired state - ANSWER-The use of a
baseline can help the organization to:

confidentiality - ANSWER-An benefit provided by a symmetric algorithm is:

Confidentiality - ANSWER-One of the most important considerations when two
organizations are considering a merger is?

Confidentiality, Integrity, and Availability - ANSWER-The core principles of an
information security program are

Countermeasure - ANSWER-Encryption is an example of a:

Create a secure tunnel to allow transmission of sensitive data over an insecure network
- ANSWER-A Virtual Private Network (VPN) is used to:

Detective control - ANSWER-An audit log is an example of a:

Determine the desired state of security - ANSWER-The first step in an information
security strategy is to:

Determine the disparity between current and desired state - ANSWER-A gap analysis
can be used to:

determine the priorities for recovery of business processes and systems - ANSWER-
The ultimate goal of BIA is to:

development of a business case - ANSWER-What is a primary method for justifying
investments in information security?

Digital signatures - ANSWER-Asymmetric algorithms are often used in:

Discourage inappropriate behavior - ANSWER-A deterrent control can be used to:

Encryption of large amounts of data - ANSWER-Symmetric key algorithms are best
used for:

Enforce policies at a desktop level - ANSWER-The use of a policy compliant system
may enable an organization to:

Ensure all data is removed or destroyed by the outsource service provider - ANSWER-
When an outsourcing contract expires the organization must:
$10.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
LUCKYSTAR2022 West Virginia University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
902
Miembro desde
3 año
Número de seguidores
724
Documentos
9572
Última venta
2 días hace
LUCKYSTAR2022

Hi there well come to luckystar2022. Here you will find guaranteed quality solution for Nursing and any other Accademic related notes, exams, study guides, cases and many more. 100% value for your time and money. GOOD LUCK

3.4

154 reseñas

5
61
4
25
3
25
2
8
1
35

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes