100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
ISACA Certified Information Security Manager (CISM) Prep | 40 Questions with 100% Correct Answers | Verified €6,32   In winkelwagen

Tentamen (uitwerkingen)

ISACA Certified Information Security Manager (CISM) Prep | 40 Questions with 100% Correct Answers | Verified

 19 keer bekeken  1 keer verkocht

Which of the following is the primary step in control implementation for a new business application? - ANS - D. Risk assessment When implementing an information security program, in which phase of the implementation should metrics be established to assess the effectiveness of the program over ti...

[Meer zien]

Voorbeeld 2 van de 6  pagina's

  • 17 november 2022
  • 6
  • 2022/2023
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
Alle documenten voor dit vak (39)
avatar-seller
Eustace
ISACA Certified Information Security
Manager (CISM) Prep
Which of the following is the primary step in control implementation for a new business application? -
ANS - D. Risk assessment


When implementing an information security program, in which phase of the implementation should
metrics be established to assess the effectiveness of the program over time?" - ANS - Either
B. Initiation
C. Design


Data owners are concerned and responsible for who has access to their resources and therefore need to
be concerned with the strategy of how to mitigate risk of data resource usage. Which of the following
actions facilitates that responsibility? - ANS - B. Entitlement changes


Which of the following is the best method to determine the effectiveness of the incident response
process? - ANS - C. Post-incident review


When properly implemented, a risk management program should be designed to reduce an
organization's risk to: - ANS - C. A level at which the organization is willing to accept


What controls the process of introducing changes to systems to ensure that unintended changes are not
introduced? - ANS - C. Change management


All actions dealing with incidents must be worked with cyclical consideration. What is the primary post-
incident review takeaway? - ANS - Either
A. Pursuit of legal action


B. Identify personnel failures


D. Derive ways to improve the response process

, If a forensics copy of a hard drive is required for legal matters, which of the following options provide
the best solid defense for preservation of evidence? - ANS - C. A bit-by-bit copy of all data


What is the preferred step an ISM should take to ensure the disaster recovery plan is adequate and
remains current? - ANS - A. Quarterly reviews of recovery plan information


Which of the following would prove to be the best protection and recovery procedures if an intruder has
gained root access to a system? - ANS - Either
A. Use system recovery to restore the last known good image


C. Rebuild the system and its OS and applications using the original vendor media


D. Have all users change passwords


As the increased use of regulation and compliance in the Information Security arena expands,
information security managers must work to put tasks into perspective. To do this, ISMs should involve
affected organizations and view "regulations" as a? - ANS - Either
A. Risk


B. Legal interpretation


Which of the following is the most significant challenge when developing an incident management
plan? - ANS - D. Lack of management and leadership buy-in


Resource allocation is crucial during incident triage as it assists in prioritization and categorization. Why
would this be critical for most organizations when conducting triage? - ANS - A. Most organizations
have limited incident handling resources


As part of the Risk Management process, assessments must be performed on the information systems
and resources of an organization. If there are vulnerabilities disclosed during an assessment, those

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Eustace. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €6,32. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 62890 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€6,32  1x  verkocht
  • (0)
  Kopen