100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CISM Verified Exam Questions and Answers $12.49   Add to cart

Exam (elaborations)

CISM Verified Exam Questions and Answers

 5 views  0 purchase
  • Course
  • CISM
  • Institution
  • CISM

CISM Verified Exam Questions and Answers How much security is enough? - answerJust enough What is the role of the security professional? - answerAdvise, not decide, on security matters for the organization Define confidentiality - answerPrevent unauthorized disclosure of data (privacy, security...

[Show more]

Preview 2 out of 12  pages

  • August 17, 2024
  • 12
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CISM
  • CISM
avatar-seller
Brightstars
©EXAM STUDY MATERIAL 8/9/2024 11:50 AM




CISM Verified Exam Questions and Answers

How much security is enough? - answer✔✔Just enough

What is the role of the security professional? - answer✔✔Advise, not decide, on security matters
for the organization

Define confidentiality - answer✔✔Prevent unauthorized disclosure of data (privacy, security)

Define integrity - answer✔✔Prevent/detect unauthorized modification of data

Define availability - answer✔✔Ensure timely access to resources

What is the opposite of confidentiality? - answer✔✔Disclosure of data

What is the opposite of integrity? - answer✔✔Alteration of data

What is the opposite of availbility? - answer✔✔Destruction of data

Identify ways to violate confidentiality - answer✔✔Sniffing, shoulder surfing, social
engineering, media reuse

Identify ways to violate integrity - answer✔✔intentional modification of database files,
accidental modification of database files, corruption of data

Identify ways to violate availability - answer✔✔denial of service attack, physical theft or
vandalism

What is the biggest threat to confidentiality? - answer✔✔Social Engineering

Identify best practices to protect CIA - answer✔✔Separation of duties, mandatory vacation, job
rotation, least privilege, need to know, dual control

What is security governance? - answer✔✔Set of responsibilities and practices exercised by the
board and executive management with the goal of providing strategic direction, ensuring
objectives are achieved, ascertaining that risks are managed appropriately, and verifying that the
enterprise's resource are used responsibly

What are the three components of data classification? - answer✔✔Cost, classify, controls

, ©EXAM STUDY MATERIAL 8/9/2024 11:50 AM


What is data classification? - answer✔✔Development of sensitivity labels for data and the
assignment of those labels for the purpose fo configuing baseline security based on value of data

What is the highest level of private and government classification? - answer✔✔Confidential,
Top Secret

What is the second highest level of private and government classification? - answer✔✔Private,
Secret

What is the third highest level of private and government classification? - answer✔✔Sensitive,
Confidential

What is a switch? - answer✔✔Connects multiple devices and prvents data collisions by using
MAC addressing to determine where to forward traffic

What is a router? - answer✔✔Segments traffic into different networks (or subnets). Routers can
connect difference network addresses and can isolate broadcast traffic

What is the difference between a switch and a router? - answer✔✔A router can isolate broadcast
traffic while a switch cannot

What is a vLAN? - answer✔✔Creates multiple broadcast domains on a single switch so you do
not have to worry about running out of port space

What is the advantage of a VLAN over a router? - answer✔✔A VLAN is much cheaper than a
router and takes up less physical space

What type of switch can connect different routers? - answer✔✔Layer 3 switch

What is a DMZ? - answer✔✔Servers that are publicly availbale on the network, but segmented
from the internal network

What is a firewall? - answer✔✔Enforces network policy by inspecting traffic and then either
allowing or blocking it

What is the advantage of a firewall on a hardware device? - answer✔✔Better performance and
security

What is the advantage of a firewall on a software device? - answer✔✔Better cost

What does a static firewall do? - answer✔✔Bases routing decision on source and destination IP
address. Does not offer a lot of flexibility.

What does a stateful firewall do? - answer✔✔Bases routing decision on who intiatied the session
and can block unsolicited replies

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Brightstars. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81989 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart