
CISM Day1

Quiz
•
Computers
•
Professional Development
•
Medium
Omantel Ohi
Used 11+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following requirements would have the lowest level of priority in information security?
Technical
Regulatory
Privacy
Business
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The PRIMARY goal in developing an information security strategy is to:
establish security metrics and performance monitoring
educate business process owners regarding their duties
ensure that legal and regulatory requirements are met.
support the business objectives of the organization
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Senior management commitment and support for information security can BEST be enhanced through:
a formal security policy sponsored by the chief executive officer (CEO).
regular security awareness training for employees.
periodic review of alignment with business management goals.
senior management signoff on the information security strategy
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following MOST commonly falls within the scope of an information security governance steering committee?
Interviewing candidates for information security specialist positions
Developing content for security awareness programs
Prioritizing information security initiatives
Approving access to critical financial systems
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is the MOST important factor when designing information security architecture?
Technical platform interfaces
Scalability of the network
Development methodologies
Stakeholder requirements
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
What will have the HIGHEST impact on standard information security governance models?
Number of employees
Distance between physical locations
Complexity of organizational structure
Organizational budget
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In order to highlight to management the importance of integrating information security in the business processes, a newly hired information security officer should
FIRST:
prepare a security budget.
conduct a risk assessment.
develop an information security policy.
obtain benchmarking information.
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
#02 Incident Response, BC, and DR Concepts

Quiz
•
Professional Development
14 questions
cyber security

Quiz
•
KG - Professional Dev...
12 questions
Business Processes - Lesson 2 - Info Security Req's

Quiz
•
Professional Development
10 questions
IT ENGLISH: Research Project Topics - Dark, Deep & Surface Web

Quiz
•
Professional Development
15 questions
AI Cybersecurity Quiz

Quiz
•
Professional Development
10 questions
Bootcamp DTSFGA Modul 12 dan 13 CCT

Quiz
•
Professional Development
15 questions
ISC2 - Chapter 1 - Module 1 - G2

Quiz
•
Professional Development
15 questions
Security+ Study Guide-10 Understanding Cryptography and PKI

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade