Database Management > QUESTIONS & ANSWERS > CISM Exam Prep 2022 with complete solution. Exam predictor. rated A (All)

CISM Exam Prep 2022 with complete solution. Exam predictor. rated A

Document Content and Description Below

CISM Exam Prep 2022 with complete solution Information security governance is primarily driven by: -Answer- Business strategy Who should drive the risk analysis for an organization? -Answer- the Sec... urity Manager Who should be responsible for enforcing access rights to application data? -AnswerSecurity administrators The MOST important component of a privacy policy is: -Answer- notifications Investment in security technology and processes should be based on: -Answer- clear alignment with the goals and objectives of the organization Define information security governance -Answer- 1. A set of policies and procedures that establishes a framework of information security strategies 2. A practice area that ensures efficient utilization of information resources The main purpose of information security governance -Answer- to ensure the safety of information including its Confidentiality, Integrity and Availability. Information security governance protects information from loss, misuse, unauthorized usage, and destruction during its life cycle or the time it is being used in an organization. Benefits of information security governance -Answer- - accountability for protecting information during important business activities - reduction of the impact of security incidents - reduction in risks to tolerable limits - protection from civil and legal liabilities - enhancement of trust in customer relationships - assurance of policy compliance - protection of company reputation In order to be effective, information security governance needs to provide 6 basic outcomes: -Answer- - strategic alignment - value delivery - risk management - performance measurement - resource management - integration Should information security investments be optimized or minimized? -AnswerOptimized so that they support business objectives. Primary goals of resource management: -Answer- - keeping a record of security practices and processes - acquiring knowledge and making it accessible- building a security architecture that identifies and uses infrastructure resources properly What is Corporate Governance? -Answer- Corporate governance is a set of procedures and duties performed by the board of directors and executive management to direct and control the organization. Corporate governance helps the board of directors to • ensure that business objectives are met • provide strategic direction for business activities • verify the efficient use of the organization's resources, and ensure proper handling of business risks Information Security Governance -Answer- While corporate governance deals with performance and control at all levels of the organization, information security governance is a subset of corporate governance. Information security governance is concerned with the policies and controls related to protecting information in the organization. It helps you to • ensure that information security objectives are achieved • provide strategic direction for information security activities • ensure the efficient use of information resources, and manage information security risks General components of the Information Security Governance Framework are: -Answer- - security strategy - security policies - standards - security organizational structure - metrics and monitoring Steering Committee -Answer- Consists of senior representatives of departments that are directly or indirectly affected by information security policies. The steering committee aims to involve all stakeholders influenced by security aspects. Who is responsible for identifying information assets that need to be protected and assigning appropriate priorities and protection levels for them? -Answer- The Board of Directors Who is responsible for achieving organizational consent over priorities related to information security and ensuring the involvement of all stakeholders influenced by security considerations? -Answer- The Steering Committe Who needs to establish reporting and communication channels in the whole organization to make sure that information security governance is effective? -AnswerThe CISOWho should establish processes for integrating security with business objectives and provide proper leadership and continuous support to the people working to implement information security? -Answer- Executive Management What is GRC? -Answer- Governance, Risk Management, Compliance What are the 3 GRC processes? -Answer- - Governance is the process that senior management can use to direct and control an organization. It involves developing methods to ensure that all employees of the organization adhere to its policies, standards, and procedures. - Risk management helps you create and implement methods for mitigating risks. Using this process, you can establish the organization's risk tolerance, recognize potential risks and their impact on business operations, and decide the priority for mitigating the risks based on business goals and risk tolerance. - Compliance is the process using which you can supervise the controls and methods that ensure adherence to an organization's policies, standards, and procedures. Systems Theory -Answer- Systems Theory is a network of processes, people, technologies, relationships, events, reactions, and results that interact with each other to achieve one common goal. By analyzing these interactions, an information security manager can understand the working of a system in an organization and control any risks to it. 4 elements of the information security business model -Answer- • organization design and strategy • people • process • technology 6 dynamic interconnections of the information security business model -Answer- • governance • culture • enablement and support • emergence • human factors • architecture Governance dynamic interconnection of information security business model -AnswerThe governance dynamic interconnection links the organization and process elements. It involves guiding and controlling an organization. Culture dynamic interconnection of information security business model -Answer- The culture dynamic interconnection links the organization and people elements. It represents people's beliefs, opinions, and behaviors.Enablement and Support dynamic interconnection of information security business model -Answer- The enablement and support dynamic interconnection links the technology and process elements. It involves creating security policies, guidelines, and standards to support business requirements. Emergence dynamic interconnection of information security business model -AnswerThe emergence interconnection links the people and process elements. It indicates patterns in an organization's life that appear and grow without any evident reason, and have results that are difficult to forecast and control. Human Factors dynamic interconnection of information security business model - Answer- The human factors interconnection links the people and technology elements, and indicates the relationship and gap between these elements. Architecture dynamic interconnection of information security business model -AnswerThe architecture interconnection links the organization and technology elements. It completely covers an organization's policies, processes, people, and technology that compose the security practices. for the information security strategy to be effective, it should be developed to achieve certain high-level outcomes: -Answer- - strategic alignment - risk management - value delivery - resource management - performance measurement - process assurance Which 3 key participants are involved in the development of the information security strategy? -Answer- 1. The BOD or the senior management 2. the executive management and steering committee 3. the CISO or ISM responsibilities of key participants involved in developing an information security strategy -Answer- The senior management ensures that the organization's information security strategy is aligned with its business strategy and objectives. The executive management and steering committee are actively involved in risk management. It involves managing the threats to inform [Show More]

Last updated: 1 year ago

Preview 1 out of 7 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Reviews( 0 )

$8.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
82
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 22, 2022

Number of pages

7

Written in

Seller


seller-icon
bundleHub Solution guider

Member since 2 years

313 Documents Sold


Additional information

This document has been written for:

Uploaded

Sep 22, 2022

Downloads

 0

Views

 82

Document Keyword Tags

More From bundleHub Solution guider

View all bundleHub Solution guider's documents »
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·