100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
ISACA Certified Information Security Manager (CISM) EXAM Prep correctly answered €12,15   In winkelwagen

Tentamen (uitwerkingen)

ISACA Certified Information Security Manager (CISM) EXAM Prep correctly answered

 1 keer bekeken  0 keer verkocht

Which of the following is the primary step in control implementation for a new business application? - correct answer D. Risk assessment When implementing an information security program, in which phase of the implementation should metrics be established to assess the effectiveness of the progra...

[Meer zien]

Voorbeeld 2 van de 5  pagina's

  • 4 januari 2024
  • 5
  • 2023/2024
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
Alle documenten voor dit vak (34)
avatar-seller
THEEXCELLENCELIBRARY
ISACA Certified Information Security
Manager (CISM) Prep correctly answered
Which of the following is the primary step in control implementation for a new business
application? - correct answer D. Risk assessment

When implementing an information security program, in which phase of the
implementation should metrics be established to assess the effectiveness of the
program over time?" - correct answer Either
B. Initiation
C. Design

Data owners are concerned and responsible for who has access to their resources and
therefore need to be concerned with the strategy of how to mitigate risk of data resource
usage. Which of the following actions facilitates that responsibility? - correct answer B.
Entitlement changes

Which of the following is the best method to determine the effectiveness of the incident
response process? - correct answer C. Post-incident review

When properly implemented, a risk management program should be designed to reduce
an organization's risk to: - correct answer C. A level at which the organization is willing
to accept

What controls the process of introducing changes to systems to ensure that unintended
changes are not introduced? - correct answer C. Change management

All actions dealing with incidents must be worked with cyclical consideration. What is
the primary post-incident review takeaway? - correct answer Either
A. Pursuit of legal action

B. Identify personnel failures

D. Derive ways to improve the response process

If a forensics copy of a hard drive is required for legal matters, which of the following
options provide the best solid defense for preservation of evidence? - correct answer C.
A bit-by-bit copy of all data

What is the preferred step an ISM should take to ensure the disaster recovery plan is
adequate and remains current? - correct answer A. Quarterly reviews of recovery plan
information

, Which of the following would prove to be the best protection and recovery procedures if
an intruder has gained root access to a system? - correct answer Either
A. Use system recovery to restore the last known good image

C. Rebuild the system and its OS and applications using the original vendor media

D. Have all users change passwords

As the increased use of regulation and compliance in the Information Security arena
expands, information security managers must work to put tasks into perspective. To do
this, ISMs should involve affected organizations and view "regulations" as a? - correct
answer Either
A. Risk

B. Legal interpretation

Which of the following is the most significant challenge when developing an incident
management plan? - correct answer D. Lack of management and leadership buy-in

Resource allocation is crucial during incident triage as it assists in prioritization and
categorization. Why would this be critical for most organizations when conducting
triage? - correct answer A. Most organizations have limited incident handling resources

As part of the Risk Management process, assessments must be performed on the
information systems and resources of an organization. If there are vulnerabilities
disclosed during an assessment, those vulnerabilities should be: - correct answer d.
Evaluated and prioritized based on credible threat and impact if exploited and and
mitigation cost

A security strategy is important for an organization, and along with the creation of
supporting policies. What should the overall planning effort cover? - correct answer
Either
A. The logical security architecture for the organization

B. The intent and direction and expectations of management

D. Assist in FISMA audits

What is the most important security objective in creating good procedures to meet the
requirements of a relevant policy? - correct answer A. Being comprehensive and
unambiguous

Along with attention to detail, what is an additional quality required of an incident
handler? - correct answer D. Ability to handle stress

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper THEEXCELLENCELIBRARY. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €12,15. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 75323 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€12,15
  • (0)
  Kopen