Book Image

Certified Information Security Manager Exam Prep Guide - Second Edition

By : Hemang Doshi
Book Image

Certified Information Security Manager Exam Prep Guide - Second Edition

By: Hemang Doshi

Overview of this book

CISM is a globally recognized and much sought-after certification in the field of IT security. This second edition of the Certified Information Security Manager Exam Prep Guide is up to date with complete coverage of the exam content through comprehensive and exam-oriented explanations of core concepts. Written in a clear, succinct manner, this book covers all four domains of the CISM Review Manual. With this book, you’ll unlock access to a powerful exam-prep platform which includes interactive practice questions, exam tips, and flashcards. The platform perfectly complements the book and even lets you bring your questions directly to the author. This mixed learning approach of exploring key concepts through the book and applying them to answer practice questions online is designed to help build your confidence in acing the CISM certification. By the end of this book, you'll have everything you need to succeed in your information security career and pass the CISM certification exam with this handy, on-the-job desktop reference guide.
Table of Contents (12 chapters)

Revision Questions

  1. A security manager discovered an attempted SQL injection attack on an application. However, they could not determine whether it was successful. Who is in the best position to assess the possible impact of the attack?
    1. The application support team
    2. The incident response team
    3. The business process owner
    4. The network security team
  2. What is the most important advantage of implementing a systematic and methodological incident management program?
    1. It reduces the cost of incident management
    2. It makes incident management more flexible
    3. It helps the responder gain experience
    4. It provides evidence of due diligence to support legal and liability claims
  3. Once a virus incident has been resolved, the security manager will be most interested in knowing the:
    1. Configuration of the anti-malware software
    2. Other organizations impacted by the same virus
    3. Path of the virus's entry
    4. Author of the virus
  4. What is the objective of reviewing the observations of staff involved in a disaster recovery...