Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Examen

CISM TEST QUESTIONS WITH 100% VERIFIED SOLUTIONS

Note
-
Vendu
-
Pages
9
Grade
A+
Publié le
26-05-2025
Écrit en
2024/2025

CISM TEST QUESTIONS WITH 100% VERIFIED SOLUTIONS The security requirements of each member of the organization should be documented in: - ANSWER- Their job descriptions What could be the greatest challenge to implementing a new security strategy? - ANSWER- Obtaining buy-in from employees A disgruntled former employee is a: - ANSWER- Threat A bug or software flaw is a: - ANSWER- Vulnerability An audit log is an example of a: - ANSWER- Detective control A compensating control is used: - ANSWER- When normal controls are not sufficient to mitigate the trick Encryption is an example of a: - ANSWER- Countermeasure The examination of risk factors would be an example of: - ANSWER- Risk analysis True/False: The only real risk mitigation technique is based on effective implementation of technical controls. - ANSWER- False Should a risk assessment consider controls that are planned but not yet implemented? - ANSWER- Yes, because it would not be appropriate to recommend implementing controls that are already planned The main purpose of information classification is to: - ANSWER- Ensure the effective, appropriate protection of information The value of information is based in part on: - ANSWER- The fines imposed by regulators in the event of a breach The definition of an information security baseline is: - ANSWER- The minimum level of security mandated in the organization The use of a baseline can help the organization to: - ANSWER- Compare the current state of security with the desired state The purpose of a Business Impact Analysis (BIA) is to: - ANSWER- Estimate the potential impact on the business in case of a system failure The ultimate goal of BIA is to: - ANSWER- determine the priorities for recovery of business processes and systems New controls should be implemented as a part of the risk mitigation strategy: - ANSWER- In areas where the cost of the control is justified by the benefit obtained An example of risk transference as a risk mitigation option is: - ANSWER- The purchase of insurance to cover some of the losses associated with an incident. The purpose of a life cycle (as used in the Systems Development Life Cycle (SDLC)) is to: - ANSWER- Assist in the management of a complex project by breaking it into individual steps At which stage of a project should risk management be performed? - ANSWER- At each stage starting at project initiation When working with an outside party that may include access to sensitive information, each party should require a: - ANSWER- Non-disclosure agreement (NDA) Symmetric key algorithms are best used for: - ANSWER- Encryption of large amounts of data An benefit provided by a symmetric algorithm is: - ANSWER- confidentiality Asymmetric algorithms are often used in: - ANSWER- Digital signatures The primary benefit of a hash function is: - ANSWER- Proving integrity of a message Which key would open a message encrypted with John's public key? - ANSWER- John corresponding private key Symmetric encryption is a: - ANSWER- two-way encryption process A primary reason for the development of public key cryptography was to: - ANSWER- Address the ley distribution problems of asymmetric encryption What is the length of a digest created by a hash function? - ANSWER- A hash function creates a fixed length hash regardless of input message length A hash is often used for: - ANSWER- Password based authentication The entity requesting access in an access control system is often known as: - ANSWER- The subject Access control is a means to: - ANSWER- Permit authorized persons appropriate levels of access A surveillance camera is an access control based on: - ANSWER- Physical controls Anti-virus systems should be deployed on: - ANSWER- Gateways and individual desktops The use of a policy compliant system may enable an organization to: - ANSWER- Enforce policies at a desktop level An information classification policy is what form of control? - ANSWER- Administrative controls Which of the following is a one-way function? - ANSWER- Hashing True/False: A Disaster Recovery Plan is a part of an Information Security Framework - ANSWER- True An important element of an information security program is: - ANSWER- The development of metrics to measure program performance Identity management applies to: - ANSWER- Giving both internal and external users unique identification The practice of only granting a user the lowest level required is: - ANSWER- Least privilege A deterrent control can be used to: - ANSWER- Discourage inappropriate behavior An example of a preventative control is: - ANSWER- A fence A disadvantage of an automated control may be: - ANSWER- That it may implement a configuration change automatically without review The implementation of a security program requires: - ANSWER- a person that takes ownership of each activity

Montrer plus Lire moins
Établissement
CISM
Cours
CISM









Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
CISM
Cours
CISM

Infos sur le Document

Publié le
26 mai 2025
Nombre de pages
9
Écrit en
2024/2025
Type
Examen
Contient
Questions et réponses

Sujets

Aperçu du contenu

CISM TEST QUESTIONS WITH 100% VERIFIED
SOLUTIONS
The security requirements of each member of the organization should be documented
in: - ANSWER- Their job descriptions

What could be the greatest challenge to implementing a new security strategy? -
ANSWER- Obtaining buy-in from employees

A disgruntled former employee is a: - ANSWER- Threat

A bug or software flaw is a: - ANSWER- Vulnerability

An audit log is an example of a: - ANSWER- Detective control

A compensating control is used: - ANSWER- When normal controls are not sufficient to
mitigate the trick

Encryption is an example of a: - ANSWER- Countermeasure

The examination of risk factors would be an example of: - ANSWER- Risk analysis

True/False: The only real risk mitigation technique is based on effective implementation
of technical controls. - ANSWER- False

Should a risk assessment consider controls that are planned but not yet implemented? -
ANSWER- Yes, because it would not be appropriate to recommend implementing
controls that are already planned

The main purpose of information classification is to: - ANSWER- Ensure the effective,
appropriate protection of information

The value of information is based in part on: - ANSWER- The fines imposed by
regulators in the event of a breach

The definition of an information security baseline is: - ANSWER- The minimum level of
security mandated in the organization

The use of a baseline can help the organization to: - ANSWER- Compare the current
state of security with the desired state

, The purpose of a Business Impact Analysis (BIA) is to: - ANSWER- Estimate the
potential impact on the business in case of a system failure

The ultimate goal of BIA is to: - ANSWER- determine the priorities for recovery of
business processes and systems

New controls should be implemented as a part of the risk mitigation strategy: -
ANSWER- In areas where the cost of the control is justified by the benefit obtained

An example of risk transference as a risk mitigation option is: - ANSWER- The purchase
of insurance to cover some of the losses associated with an incident.

The purpose of a life cycle (as used in the Systems Development Life Cycle (SDLC)) is
to: - ANSWER- Assist in the management of a complex project by breaking it into
individual steps

At which stage of a project should risk management be performed? - ANSWER- At each
stage starting at project initiation

When working with an outside party that may include access to sensitive information,
each party should require a: - ANSWER- Non-disclosure agreement (NDA)

Symmetric key algorithms are best used for: - ANSWER- Encryption of large amounts of
data

An benefit provided by a symmetric algorithm is: - ANSWER- confidentiality

Asymmetric algorithms are often used in: - ANSWER- Digital signatures

The primary benefit of a hash function is: - ANSWER- Proving integrity of a message

Which key would open a message encrypted with John's public key? - ANSWER- John
corresponding private key

Symmetric encryption is a: - ANSWER- two-way encryption process

A primary reason for the development of public key cryptography was to: - ANSWER-
Address the ley distribution problems of asymmetric encryption

What is the length of a digest created by a hash function? - ANSWER- A hash function
creates a fixed length hash regardless of input message length
€10,47
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur
Seller avatar
TopGradeGuru
1,5
(2)

Document également disponible en groupe

Faites connaissance avec le vendeur

Seller avatar
TopGradeGuru Teachme2-tutor
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
10
Membre depuis
1 année
Nombre de followers
0
Documents
2429
Dernière vente
1 mois de cela
GRADEHUB

We provide access to a wide range of professionally curated exams for students and educators. It offers high-quality, up-to-date assessment materials tailored to various subjects and academic levels. With instant downloads and affordable pricing, it's the go-to resource for exam preparation and academic success.

1,5

2 revues

5
0
4
0
3
0
2
1
1
1

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions