Search Header Logo

CISM Pre assessment

Authored by Omantel Ohi

Computers

Professional Development

Used 27+ times

CISM Pre assessment
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following reasons is the MOST important to develop a strategy before implementing an information security program

To justify program development costs

To integrate development activities

To gain management support for an information security program

To comply with international standards

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

How does knowledge of risk appetite help to increase security control effectiveness?

It shows senior management that you understand their needs

It provides a basis for redistributing resources to mitigate risk above the risk appetite

It requires continuous monitoring because the entire risk environment is constantly changing

It facilitates communication with management about the importance of security

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When an organization is setting up a relationship with a third-party IT service provider, which of the following is one of the MOST important topics to include in the contract from a security standpoint?

Compliance with international security standards

Use of a two-factor authentication system

Existence of an alternate hot site in case of business disruption

Compliance with the organization’s information security requirements

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following choices is MOST important to verify to ensure the availability of key business processes at an alternate site?

Recovery time objective

Functional delegation matrix

Staff availability to the site

End-to-end transaction flow

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following steps should be FIRST in developing an information security plan?

Perform a technical vulnerabilities assessment.

Analyze the current business strategy.

Perform a business impact analysis

Assess the current levels of security awareness

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Information security governance is PRIMARILY driven by:

technology constraints

regulatory requirements.

litigation potential.

business strategy.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The FIRST step to create an internal culture that embraces information security is to:

implement stronger controls.

conduct periodic awareness training.

actively monitor operations

gain endorsement from executive management.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?