CISM Day1

CISM Day1

Professional Development

10 Qs

quiz-placeholder

Similar activities

Footprinting and Reconnaissance

Footprinting and Reconnaissance

Professional Development

10 Qs

isc2 sample questions

isc2 sample questions

Professional Development

14 Qs

Gordon's Review: Mod 1 Intro to Cybersecurity

Gordon's Review: Mod 1 Intro to Cybersecurity

Professional Development

10 Qs

Activity2

Activity2

Professional Development

15 Qs

#01 Security Principle

#01 Security Principle

Professional Development

10 Qs

Level 5 - Certificates & PKI Quiz

Level 5 - Certificates & PKI Quiz

Professional Development

13 Qs

It jobs

It jobs

Professional Development

15 Qs

Review Class 9

Review Class 9

Professional Development

9 Qs

CISM Day1

CISM Day1

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Omantel Ohi

Used 11+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following requirements would have the lowest level of priority in information security?

Technical

Regulatory

Privacy

Business

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The PRIMARY goal in developing an information security strategy is to:

establish security metrics and performance monitoring

educate business process owners regarding their duties

ensure that legal and regulatory requirements are met.

support the business objectives of the organization

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Senior management commitment and support for information security can BEST be enhanced through:

a formal security policy sponsored by the chief executive officer (CEO).

regular security awareness training for employees.

periodic review of alignment with business management goals.

senior management signoff on the information security strategy

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following MOST commonly falls within the scope of an information security governance steering committee?

Interviewing candidates for information security specialist positions

Developing content for security awareness programs

Prioritizing information security initiatives

Approving access to critical financial systems

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the MOST important factor when designing information security architecture?

Technical platform interfaces

Scalability of the network

Development methodologies

Stakeholder requirements

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What will have the HIGHEST impact on standard information security governance models?

Number of employees

Distance between physical locations

Complexity of organizational structure

Organizational budget

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In order to highlight to management the importance of integrating information security in the business processes, a newly hired information security officer should

FIRST:

prepare a security budget.

conduct a risk assessment.

develop an information security policy.

obtain benchmarking information.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?