100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CISM TEST QUESTIONS WITH 100% VERIFIED SOLUTIONS

Puntuación
-
Vendido
-
Páginas
9
Grado
A+
Subido en
26-05-2025
Escrito en
2024/2025

CISM TEST QUESTIONS WITH 100% VERIFIED SOLUTIONS The security requirements of each member of the organization should be documented in: - ANSWER- Their job descriptions What could be the greatest challenge to implementing a new security strategy? - ANSWER- Obtaining buy-in from employees A disgruntled former employee is a: - ANSWER- Threat A bug or software flaw is a: - ANSWER- Vulnerability An audit log is an example of a: - ANSWER- Detective control A compensating control is used: - ANSWER- When normal controls are not sufficient to mitigate the trick Encryption is an example of a: - ANSWER- Countermeasure The examination of risk factors would be an example of: - ANSWER- Risk analysis True/False: The only real risk mitigation technique is based on effective implementation of technical controls. - ANSWER- False Should a risk assessment consider controls that are planned but not yet implemented? - ANSWER- Yes, because it would not be appropriate to recommend implementing controls that are already planned The main purpose of information classification is to: - ANSWER- Ensure the effective, appropriate protection of information The value of information is based in part on: - ANSWER- The fines imposed by regulators in the event of a breach The definition of an information security baseline is: - ANSWER- The minimum level of security mandated in the organization The use of a baseline can help the organization to: - ANSWER- Compare the current state of security with the desired state The purpose of a Business Impact Analysis (BIA) is to: - ANSWER- Estimate the potential impact on the business in case of a system failure The ultimate goal of BIA is to: - ANSWER- determine the priorities for recovery of business processes and systems New controls should be implemented as a part of the risk mitigation strategy: - ANSWER- In areas where the cost of the control is justified by the benefit obtained An example of risk transference as a risk mitigation option is: - ANSWER- The purchase of insurance to cover some of the losses associated with an incident. The purpose of a life cycle (as used in the Systems Development Life Cycle (SDLC)) is to: - ANSWER- Assist in the management of a complex project by breaking it into individual steps At which stage of a project should risk management be performed? - ANSWER- At each stage starting at project initiation When working with an outside party that may include access to sensitive information, each party should require a: - ANSWER- Non-disclosure agreement (NDA) Symmetric key algorithms are best used for: - ANSWER- Encryption of large amounts of data An benefit provided by a symmetric algorithm is: - ANSWER- confidentiality Asymmetric algorithms are often used in: - ANSWER- Digital signatures The primary benefit of a hash function is: - ANSWER- Proving integrity of a message Which key would open a message encrypted with John's public key? - ANSWER- John corresponding private key Symmetric encryption is a: - ANSWER- two-way encryption process A primary reason for the development of public key cryptography was to: - ANSWER- Address the ley distribution problems of asymmetric encryption What is the length of a digest created by a hash function? - ANSWER- A hash function creates a fixed length hash regardless of input message length A hash is often used for: - ANSWER- Password based authentication The entity requesting access in an access control system is often known as: - ANSWER- The subject Access control is a means to: - ANSWER- Permit authorized persons appropriate levels of access A surveillance camera is an access control based on: - ANSWER- Physical controls Anti-virus systems should be deployed on: - ANSWER- Gateways and individual desktops The use of a policy compliant system may enable an organization to: - ANSWER- Enforce policies at a desktop level An information classification policy is what form of control? - ANSWER- Administrative controls Which of the following is a one-way function? - ANSWER- Hashing True/False: A Disaster Recovery Plan is a part of an Information Security Framework - ANSWER- True An important element of an information security program is: - ANSWER- The development of metrics to measure program performance Identity management applies to: - ANSWER- Giving both internal and external users unique identification The practice of only granting a user the lowest level required is: - ANSWER- Least privilege A deterrent control can be used to: - ANSWER- Discourage inappropriate behavior An example of a preventative control is: - ANSWER- A fence A disadvantage of an automated control may be: - ANSWER- That it may implement a configuration change automatically without review The implementation of a security program requires: - ANSWER- a person that takes ownership of each activity

Mostrar más Leer menos
Institución
CISM
Grado
CISM









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CISM
Grado
CISM

Información del documento

Subido en
26 de mayo de 2025
Número de páginas
9
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CISM TEST QUESTIONS WITH 100% VERIFIED
SOLUTIONS
The security requirements of each member of the organization should be documented
in: - ANSWER- Their job descriptions

What could be the greatest challenge to implementing a new security strategy? -
ANSWER- Obtaining buy-in from employees

A disgruntled former employee is a: - ANSWER- Threat

A bug or software flaw is a: - ANSWER- Vulnerability

An audit log is an example of a: - ANSWER- Detective control

A compensating control is used: - ANSWER- When normal controls are not sufficient to
mitigate the trick

Encryption is an example of a: - ANSWER- Countermeasure

The examination of risk factors would be an example of: - ANSWER- Risk analysis

True/False: The only real risk mitigation technique is based on effective implementation
of technical controls. - ANSWER- False

Should a risk assessment consider controls that are planned but not yet implemented? -
ANSWER- Yes, because it would not be appropriate to recommend implementing
controls that are already planned

The main purpose of information classification is to: - ANSWER- Ensure the effective,
appropriate protection of information

The value of information is based in part on: - ANSWER- The fines imposed by
regulators in the event of a breach

The definition of an information security baseline is: - ANSWER- The minimum level of
security mandated in the organization

The use of a baseline can help the organization to: - ANSWER- Compare the current
state of security with the desired state

, The purpose of a Business Impact Analysis (BIA) is to: - ANSWER- Estimate the
potential impact on the business in case of a system failure

The ultimate goal of BIA is to: - ANSWER- determine the priorities for recovery of
business processes and systems

New controls should be implemented as a part of the risk mitigation strategy: -
ANSWER- In areas where the cost of the control is justified by the benefit obtained

An example of risk transference as a risk mitigation option is: - ANSWER- The purchase
of insurance to cover some of the losses associated with an incident.

The purpose of a life cycle (as used in the Systems Development Life Cycle (SDLC)) is
to: - ANSWER- Assist in the management of a complex project by breaking it into
individual steps

At which stage of a project should risk management be performed? - ANSWER- At each
stage starting at project initiation

When working with an outside party that may include access to sensitive information,
each party should require a: - ANSWER- Non-disclosure agreement (NDA)

Symmetric key algorithms are best used for: - ANSWER- Encryption of large amounts of
data

An benefit provided by a symmetric algorithm is: - ANSWER- confidentiality

Asymmetric algorithms are often used in: - ANSWER- Digital signatures

The primary benefit of a hash function is: - ANSWER- Proving integrity of a message

Which key would open a message encrypted with John's public key? - ANSWER- John
corresponding private key

Symmetric encryption is a: - ANSWER- two-way encryption process

A primary reason for the development of public key cryptography was to: - ANSWER-
Address the ley distribution problems of asymmetric encryption

What is the length of a digest created by a hash function? - ANSWER- A hash function
creates a fixed length hash regardless of input message length
$11.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
TopGradeGuru
1.5
(2)

Documento también disponible en un lote

Conoce al vendedor

Seller avatar
TopGradeGuru Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
10
Miembro desde
1 año
Número de seguidores
0
Documentos
2429
Última venta
1 mes hace
GRADEHUB

We provide access to a wide range of professionally curated exams for students and educators. It offers high-quality, up-to-date assessment materials tailored to various subjects and academic levels. With instant downloads and affordable pricing, it's the go-to resource for exam preparation and academic success.

1.5

2 reseñas

5
0
4
0
3
0
2
1
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes