Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Examen

CISM Certified Information Security Manager Exam

Note
-
Vendu
-
Pages
6
Grade
A+
Publié le
17-01-2025
Écrit en
2024/2025

CISM Certified Information Security Manager Exam

Établissement
Computer Information Systems
Cours
Computer information systems









Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
Computer information systems
Cours
Computer information systems

Infos sur le Document

Publié le
17 janvier 2025
Nombre de pages
6
Écrit en
2024/2025
Type
Examen
Contient
Questions et réponses

Sujets

Aperçu du contenu

CISM Certified Information Security
Manager Exam
A fence - ANSWER-An example of a preventative control is:

A hash function creates a fixed length hash regardless of input message length -
ANSWER-What is the length of a digest created by a hash function?

a person that takes ownership of each activity - ANSWER-The implementation of a
security program requires:

A security awareness program - ANSWER-The most effective tool a security
department has is:

Accreditation - ANSWER-Ensuring that a system is not implemented until it has been
formally approved by a senior manager is part of:

Address the ley distribution problems of asymmetric encryption - ANSWER-A primary
reason for the development of public key cryptography was to:

Administrative controls - ANSWER-An information classification policy is what form of
control?

Alignment with the goals and objectives of the organization - ANSWER-The foundation
of an information security program is:

an enterprise = wide approach to security architecture - ANSWER-The Sherwood
Applied Business Security Architecture SABSA is primarily concerned with

Any event or action that could cause harm to the organization - ANSWER-What is a
threat?

Assist in the management of a complex project by breaking it into individual steps -
ANSWER-The purpose of a life cycle as used in the Systems Development Life Cycle
SDLC is to:

At each stage starting at project initiation - ANSWER-At which stage of a project should
risk management be performed?

business assurance - ANSWER-Audit is a form of:

Certification - ANSWER-The testing and evaluation of the security of a system made in
support of the decision to implement the system is known as

, Change control - ANSWER-To ensure the quality and adherence to standards for a
modification to a system the organization enforces:

Compare the current state of security with the desired state - ANSWER-The use of a
baseline can help the organization to:

confidentiality - ANSWER-An benefit provided by a symmetric algorithm is:

Confidentiality - ANSWER-One of the most important considerations when two
organizations are considering a merger is?

Confidentiality, Integrity, and Availability - ANSWER-The core principles of an
information security program are

Countermeasure - ANSWER-Encryption is an example of a:

Create a secure tunnel to allow transmission of sensitive data over an insecure network
- ANSWER-A Virtual Private Network (VPN) is used to:

Detective control - ANSWER-An audit log is an example of a:

Determine the desired state of security - ANSWER-The first step in an information
security strategy is to:

Determine the disparity between current and desired state - ANSWER-A gap analysis
can be used to:

determine the priorities for recovery of business processes and systems - ANSWER-
The ultimate goal of BIA is to:

development of a business case - ANSWER-What is a primary method for justifying
investments in information security?

Digital signatures - ANSWER-Asymmetric algorithms are often used in:

Discourage inappropriate behavior - ANSWER-A deterrent control can be used to:

Encryption of large amounts of data - ANSWER-Symmetric key algorithms are best
used for:

Enforce policies at a desktop level - ANSWER-The use of a policy compliant system
may enable an organization to:

Ensure all data is removed or destroyed by the outsource service provider - ANSWER-
When an outsourcing contract expires the organization must:
€10,01
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
LUCKYSTAR2022 West Virginia University
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
904
Membre depuis
3 année
Nombre de followers
724
Documents
9621
Dernière vente
2 semaines de cela
LUCKYSTAR2022

Hi there well come to luckystar2022. Here you will find guaranteed quality solution for Nursing and any other Accademic related notes, exams, study guides, cases and many more. 100% value for your time and money. GOOD LUCK

3,5

155 revues

5
62
4
25
3
25
2
8
1
35

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions