CISM Domain 1-17 August

CISM Domain 1-17 August

11th Grade

11 Qs

quiz-placeholder

Similar activities

Society and Culture_Review Quiz  / Sir Bien

Society and Culture_Review Quiz / Sir Bien

11th Grade

11 Qs

Exercise 1 (Continuous Tense)

Exercise 1 (Continuous Tense)

11th Grade

10 Qs

Contemporary period

Contemporary period

11th Grade

15 Qs

unit 3 - Savvy Shoppers - Vocabulary question 1 (booklet,p 50)

unit 3 - Savvy Shoppers - Vocabulary question 1 (booklet,p 50)

11th Grade

10 Qs

Mathematics Quizizz for Grad 3

Mathematics Quizizz for Grad 3

3rd Grade - University

10 Qs

Week 25 Homework - Wednesday

Week 25 Homework - Wednesday

5th Grade - University

11 Qs

English Vocab Quiz 01

English Vocab Quiz 01

9th - 12th Grade

15 Qs

Qualitative Sampling

Qualitative Sampling

11th Grade

10 Qs

CISM Domain 1-17 August

CISM Domain 1-17 August

Assessment

Quiz

Others

11th Grade

Practice Problem

Easy

Created by

Nivedita Newar

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the MOST important consideration when developing an information security strategy?

Regulatory requirements

Organizational objectives

Emerging threats

Technological advancements

Answer explanation

The information security strategy must align with the overall organizational objectives to ensure that security initiatives support the business's goals. While regulatory requirements, emerging threats, and technological advancements are important, they should be considered within the context of the organization's specific objectives.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of establishing an information security governance framework?

To enforce security policies

To ensure compliance with regulations

To align security with business objectives

To mitigate security risks

Answer explanation

The main purpose of an information security governance framework is to ensure that information security strategies and activities align with and support the organization's business objectives. While enforcing policies, ensuring compliance, and mitigating risks are important, they are secondary to alignment with business goals.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following metrics would be the most effective in evaluating the performance of an information security program?

Number of security incidents

Time to resolve security incidents

Alignment with business strategy

Compliance with industry standards

Answer explanation

The effectiveness of an information security program is best measured by how well it supports and aligns with the business strategy. The other metrics are important but focus more on operational aspects rather than strategic alignment.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should be the PRIMARY input for developing an organization's information security strategy?

Historical security incidents

Benchmarking data

Business impact analysis (BIA)

Security architecture review

Answer explanation

The PRIMARY input for developing an organization's information security strategy should be Business Impact Analysis (BIA) as it helps identify critical assets and prioritize security measures based on their impact on the business.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following BEST ensures that information security risks are effectively managed in an organization?

Implementation of technical controls

Periodic security audits

An established risk management process

Comprehensive security awareness training

Answer explanation

An established risk management process is the BEST way to ensure that information security risks are effectively managed in an organization.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The scope of the information security governance program should be determined by:

The size of the organization

The risk appetite of the organization

The number of security incidents

The complexity of the IT environment

Answer explanation

The scope of the information security governance program should be determined by the risk appetite of the organization, as it dictates the level of security measures needed to align with the organization's tolerance for risk.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Business Impact Analysis (BIA) identifies:

Historical security incidents

Benchmarking data

Critical business processes and the impact of disruptions

Security architecture review

Answer explanation

A Business Impact Analysis (BIA) identifies critical business processes and the impact of disruptions, making it the correct choice.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?