M5C2

M5C2

Professional Development

10 Qs

quiz-placeholder

Similar activities

Security Week

Security Week

Professional Development

13 Qs

ITIL-Service Design

ITIL-Service Design

Professional Development

15 Qs

M5C2

M5C2

Professional Development

10 Qs

CISSP Domain 2 (Asset Security)

CISSP Domain 2 (Asset Security)

Professional Development

10 Qs

M4Q1

M4Q1

Professional Development

10 Qs

Jean Piaget's Theory

Jean Piaget's Theory

Professional Development

14 Qs

SECURITY AUDIT BRIEF

SECURITY AUDIT BRIEF

Professional Development

9 Qs

Using Cognitive Science in the classroom

Using Cognitive Science in the classroom

Professional Development

10 Qs

M5C2

M5C2

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Rohit Narang

Used 15+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Primary objective of implementing Information security management is to:
Ensure reasonable security practices
Comply with internal audit requirements
Adopt globally recognized standards
Protect information assets

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is primary function of information security policies?
Align information security practices with strategy
Communicate intent of management to stakeholders
Perform risk assessment of IT operations and assets
Ensure compliance with requirements of standards

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information security policies are set of various policies addressing different information systems areas based on the IT infrastructure of organization. Which of the following policy is most common in all organizations?
Acceptable use policy
BYOD (Bring Your Own Device) policy
Data encryption policy
Biometric security policy

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Protecting integrity of data primarily focuses on:
Intentional leakage of data
Accidental loss of data
Accuracy and completeness
Data backup procedures

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is primary reason for periodic review of security policy?
Compliance requirements
Changes on board of directors’
Changes in environment
Joining of new employees

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is best evidence indicting support and commitment of senior management for information security initiatives?
Directive for adopting global security standard
Higher percentage of budget for security projects
Assigning responsibilities for security to IT head
Information security is on monthly meeting agenda

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a concern for compliance with information security policy?
Decrease in low risk findings in audit report
High number of approved and open policy exceptions
Security policy is reviewed once in two years
Security policy is signed by Chief Information Officer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?