Book Image

Certified Information Security Manager Exam Prep Guide - Second Edition

By : Hemang Doshi
Book Image

Certified Information Security Manager Exam Prep Guide - Second Edition

By: Hemang Doshi

Overview of this book

CISM is a globally recognized and much sought-after certification in the field of IT security. This second edition of the Certified Information Security Manager Exam Prep Guide is up to date with complete coverage of the exam content through comprehensive and exam-oriented explanations of core concepts. Written in a clear, succinct manner, this book covers all four domains of the CISM Review Manual. With this book, you’ll unlock access to a powerful exam-prep platform which includes interactive practice questions, exam tips, and flashcards. The platform perfectly complements the book and even lets you bring your questions directly to the author. This mixed learning approach of exploring key concepts through the book and applying them to answer practice questions online is designed to help build your confidence in acing the CISM certification. By the end of this book, you'll have everything you need to succeed in your information security career and pass the CISM certification exam with this handy, on-the-job desktop reference guide.
Table of Contents (12 chapters)

Risk Evaluation

In the risk evaluation phase, the level of each risk is compared with acceptable risk criteria. If the risk is within the acceptable level, then it is accepted as it is. If the risk exceeds the acceptable level, then the treatment will be some form of mitigation.

Risk Ranking

A risk with a high impact is ranked higher and given priority. The process of ranking risk in terms of its criticality is known as risk analysis. More resources are allocated to high-risk areas. Ranking each risk based on impact and likelihood is critical in determining the risk mitigation strategy. Ranking the risk helps the organization determine its priority.

Practice Question Set 9

  1. As an information security manager, you are required to close the vulnerabilities identified by external auditors. What will the most effective way to mitigate the vulnerabilities be?
    1. All vulnerabilities should be addressed immediately
    2. Mitigation should be based on threat, impact, and cost considerations...