Search Header Logo

CISM Day1

Authored by Omantel Ohi

Computers

Professional Development

Used 11+ times

CISM Day1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following requirements would have the lowest level of priority in information security?

Technical

Regulatory

Privacy

Business

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The PRIMARY goal in developing an information security strategy is to:

establish security metrics and performance monitoring

educate business process owners regarding their duties

ensure that legal and regulatory requirements are met.

support the business objectives of the organization

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Senior management commitment and support for information security can BEST be enhanced through:

a formal security policy sponsored by the chief executive officer (CEO).

regular security awareness training for employees.

periodic review of alignment with business management goals.

senior management signoff on the information security strategy

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following MOST commonly falls within the scope of an information security governance steering committee?

Interviewing candidates for information security specialist positions

Developing content for security awareness programs

Prioritizing information security initiatives

Approving access to critical financial systems

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the MOST important factor when designing information security architecture?

Technical platform interfaces

Scalability of the network

Development methodologies

Stakeholder requirements

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What will have the HIGHEST impact on standard information security governance models?

Number of employees

Distance between physical locations

Complexity of organizational structure

Organizational budget

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In order to highlight to management the importance of integrating information security in the business processes, a newly hired information security officer should

FIRST:

prepare a security budget.

conduct a risk assessment.

develop an information security policy.

obtain benchmarking information.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?