CISM 3

CISM 3

1st - 3rd Grade

20 Qs

quiz-placeholder

Similar activities

Computer Vocabulary

Computer Vocabulary

3rd Grade - University

18 Qs

pse revision module 9

pse revision module 9

1st Grade

15 Qs

Customs Super Smart Competition Babak Penyisihan

Customs Super Smart Competition Babak Penyisihan

1st Grade

20 Qs

Entrepreneurship Unit 10 Review

Entrepreneurship Unit 10 Review

3rd - 12th Grade

20 Qs

All the President's Men

All the President's Men

KG - University

20 Qs

Facts VS Opinion

Facts VS Opinion

3rd - 6th Grade

20 Qs

Module 2 - Data Protection; how safe are you?

Module 2 - Data Protection; how safe are you?

1st Grade

20 Qs

Career Test

Career Test

3rd - 12th Grade

25 Qs

CISM 3

CISM 3

Assessment

Quiz

Other

1st - 3rd Grade

Medium

Created by

Vaibhavi Sarkar

Used 5+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The chief information security officer (CISO) should ideally have a direct reporting relationship to the:

A. head of internal audit.

B. chief operations officer (COO).

C. chief technology officer (CTO).

D. legal counsel.

Answer explanation

Explanation: The chief information security officer (CISO) should ideally report to as high a level within the organization as possible. Among the choices given, the chief operations officer (COO) would have not only the appropriate level but also the knowledge of day-to-day operations. The head of internal audit and legal counsel would make good secondary choices, although they would not be as knowledgeable of the operations. Reporting to the chief technology officer (CTO) could become problematic as the CTO's goals for the infrastructure might, at times, run counter to the goals of information security.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the MOST essential task for a chief information security officer (CISO) to perform?

A. Update platform-level security settings

B. Conduct disaster recovery test exercises

C. Approve access to critical financial systems

D. Develop an information security strategy paper

Answer explanation

Explanation: Developing a strategy paper on information security would be the most appropriate. Approving access would be the job of the data owner. Updating platform-level security and conducting recovery test exercises would be less essential since these are administrative tasks.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Developing a successful business case for the acquisition of information security software products can BEST be assisted by:

A. assessing the frequency of incidents.

B. quantifying the cost of control failures.

C. calculating return on investment (ROI) projections.

D. comparing spending against similar organizations.

Answer explanation

Explanation: Calculating the return on investment (ROI) will most closely align security with the impact on the bottom line. Frequency and cost of incidents are factors that go into determining the impact on the business but, by themselves, are insufficient. Comparing spending against similar organizations can be problematic since similar organizations may have different business goals and appetites for risk.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

When an information security manager is developing a strategic plan for information security, the timeline for the plan should be:

A. aligned with the IT strategic plan.

B. based on the current rate of technological change.

C. three-to-five years for both hardware and software.

D. aligned with the business strategy.

Answer explanation

Explanation: Any planning for information security should be properly aligned with the needs of the business. Technology should not come before the needs of the business, nor should planning be done on an artificial timetable that ignores business needs.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the MOST important information to include in a strategic plan for information security?

A. Information security staffing requirements

B. Current state and desired future state

C. IT capital investment requirements

D. information security mission statement

Answer explanation

Explanation: It is most important to paint a vision for the future and then draw a road map from the stalling point to the desired future state. Staffing, capital investment and the mission all stem from this foundation.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Information security projects should be prioritized on the basis of:

A. time required for implementation.

B. impact on the organization.

C. total cost for implementation.

D. mix of resources required.

Answer explanation

Explanation: Information security projects should be assessed on the basis of the positive impact that they will have on the organization. Time, cost and resource issues should be subordinate to this objective.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the MOST important information to include in an information security standard?

A. Creation date

B. Author name

C. Initial draft approval date

D. Last review date

Answer explanation

Explanation: The last review date confirms the currency of the standard, affirming that management has reviewed the standard to assure that nothing in the environment has changed that would necessitate an update to the standard. The name of the author as well as the creation and draft dates are not that important.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?