Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CISM TEST QUESTIONS WITH ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
17
Cijfer
A+
Geüpload op
10-12-2024
Geschreven in
2024/2025

The foundation of an information security program is: - ANSWERAlignment with the goals and objectives of the organization The core principles of an information security program are: - ANSWERConfidentiality, Integrity and Availability The key factor in a successful information security program is: - ANSWERSenior Management support A threat can be described as: - ANSWERAny event or action that could cause harm to the organization True/False: Threats can be either intentional or accidental - ANSWERTrue Personnel Security requires trained personnel to manage systems and networks. When does personnel security begin? - ANSWERThrough pre-employment checks

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CISM TEST QUESTIONS WITH ANSWERS


The foundation of an information security program is: - ANSWER>>Alignment
with the goals and objectives of the organization

The core principles of an information security program are: -
ANSWER>>Confidentiality, Integrity and Availability

The key factor in a successful information security program is: -
ANSWER>>Senior Management support

A threat can be described as: - ANSWER>>Any event or action that could cause
harm to the organization

True/False: Threats can be either intentional or accidental - ANSWER>>True

Personnel Security requires trained personnel to manage systems and networks.
When does personnel security begin? - ANSWER>>Through pre-employment
checks

Who plays the most important role in information security? - ANSWER>>Upper
management

The advantage of an IPS (intrusion prevention system) over an IDS (intrusion
detection system) is that: - ANSWER>>The IPS can block suspicious activity in
real time

True/False: Physical security is an important part of an Information Security
program - ANSWER>>True

,The Sherwood Applied Business Security Architecture (SABSA) is primarily
concerned with: - ANSWER>>An enterprise=wide approach to security
architecture

A centralized approach to security has the primary advantage of: -
ANSWER>>Uniform enforcement of security policies

The greatest advantage to a decentralized approach to security is: -
ANSWER>>More adjustable to local laws and requirements

A primary objective of an information security strategy is to: -
ANSWER>>Identify and protect information assets

The first step in an information security strategy is to: - ANSWER>>Determine
the desired state of security

Effective information security governance is based on: -
ANSWER>>implementing security policies and procedures

The use of a standard such as ISO27001 is useful to: - ANSWER>>Ensure that all
relevant security needs have been addressed

Three main factors in a business case are resource usage, regulatory compliance
and: - ANSWER>>Return on investment

What is a primary method for justifying investments in information security? -
ANSWER>>development of a business case

Relationships with third parties may: - ANSWER>>Require the organization to
comply with the security standards of the third party

True or False? The organization does not have to worry about the impact of
third party relationships on the security program - ANSWER>>False

, The role of an Information Systems Security Steering Committee is to: -
ANSWER>>Provide feedback from all areas of the organization

The most effective tool a security department has is: - ANSWER>>A security
awareness program

The role of Audit in relation to Information Security is: - ANSWER>>The validate
the effectiveness of the security program against established metrics

Who should be responsible for development of a risk management strategy? -
ANSWER>>The Security Manager

The security requirements of each member of the organization should be
documented in: - ANSWER>>Their job descriptions

What could be the greatest challenge to implementing a new security strategy?
- ANSWER>>Obtaining buy-in from employees

A disgruntled former employee is a: - ANSWER>>Threat

A bug or software flaw is a: - ANSWER>>Vulnerability

An audit log is an example of a: - ANSWER>>Detective control

A compensating control is used: - ANSWER>>When normal controls are not
sufficient to mitigate the trick

Encryption is an example of a: - ANSWER>>Countermeasure

The examination of risk factors would be an example of: - ANSWER>>Risk
analysis

Geschreven voor

Vak

Documentinformatie

Geüpload op
10 december 2024
Aantal pagina's
17
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$16.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
Profcharleswellington
5.0
(1)

Maak kennis met de verkoper

Seller avatar
Profcharleswellington Princeton university
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5
Lid sinds
2 jaar
Aantal volgers
0
Documenten
1316
Laatst verkocht
4 maanden geleden
Stuvia online

Stuvia study material for exel in academics

5.0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen