ISM Topic 3 Quiz

ISM Topic 3 Quiz

University

30 Qs

quiz-placeholder

Similar activities

MPJE Section 1 Q's 11-15 and 21-26 focused

MPJE Section 1 Q's 11-15 and 21-26 focused

University

30 Qs

Q3. DPMS

Q3. DPMS

University

30 Qs

Welding Electricity

Welding Electricity

University

27 Qs

Introduction to Engineering

Introduction to Engineering

University

25 Qs

Software Engineering Quiz 3

Software Engineering Quiz 3

University

30 Qs

MPJE Section 1 Q's 6-10 and 21-26

MPJE Section 1 Q's 6-10 and 21-26

University

30 Qs

FNAF security breach

FNAF security breach

KG - Professional Development

27 Qs

MPJE Section 1 Q's 11-15 and 16-20 and 21-26 focused

MPJE Section 1 Q's 11-15 and 16-20 and 21-26 focused

University

30 Qs

ISM Topic 3 Quiz

ISM Topic 3 Quiz

Assessment

Quiz

Other

University

Hard

Created by

Mashy Ishak

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym ISE stand for in the context of Information Security Management?

Information Security Evaluation

Information Security Assessment

Information Security Enhancement

Information Security Assurance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the culmination of ISRAM and GISAM?

Information Security Risk Assessment

Information Security Evaluation Process

Global Information Security Assessment Methodology

Information Security Risk Mitigation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of processes govern the operation of a system according to the information provided?

Operational processes

Supporting processes

Management processes

Business processes

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a typical example of an operational process?

Accounting

Recruitment

Corporate Governance

Manufacturing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of Step 4 in the Business Process, 'Perform GISAM'?

Documentation Review

Analysis and Findings

Negotiate Meeting Agenda

Global Information Security Assessment Methodology

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which step involves breaking down GISAM into activities such as introduction, network architecture review, and control validation?

Step 2: Documentation Review

Step 4: Perform GISAM

Step 6: Peer Review

Step 8: Remediation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Step 6 in the Business Process, 'Peer Review'?

Validate controls

Ensure documentation validity

Provide an additional layer of assurance

Negotiate meeting agenda

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?