CISM Pre assessment

CISM Pre assessment

Professional Development

16 Qs

quiz-placeholder

Similar activities

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

GRAND OPENING INTERNSHIP EXERCISE 2024

GRAND OPENING INTERNSHIP EXERCISE 2024

Professional Development

13 Qs

เทคโนโลยี (วิทยาการคำนวณ) ชั้นมัธยมศึกษาปีที่ 5

เทคโนโลยี (วิทยาการคำนวณ) ชั้นมัธยมศึกษาปีที่ 5

Professional Development

20 Qs

Arrays & Strings using C

Arrays & Strings using C

Professional Development

15 Qs

Infomatrix 2018

Infomatrix 2018

1st Grade - Professional Development

13 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

BCA - IV SEM DBMS

BCA - IV SEM DBMS

Professional Development

20 Qs

Teaching Strategy

Teaching Strategy

Professional Development

20 Qs

CISM Pre assessment

CISM Pre assessment

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Omantel Ohi

Used 27+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following reasons is the MOST important to develop a strategy before implementing an information security program

To justify program development costs

To integrate development activities

To gain management support for an information security program

To comply with international standards

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

How does knowledge of risk appetite help to increase security control effectiveness?

It shows senior management that you understand their needs

It provides a basis for redistributing resources to mitigate risk above the risk appetite

It requires continuous monitoring because the entire risk environment is constantly changing

It facilitates communication with management about the importance of security

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When an organization is setting up a relationship with a third-party IT service provider, which of the following is one of the MOST important topics to include in the contract from a security standpoint?

Compliance with international security standards

Use of a two-factor authentication system

Existence of an alternate hot site in case of business disruption

Compliance with the organization’s information security requirements

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following choices is MOST important to verify to ensure the availability of key business processes at an alternate site?

Recovery time objective

Functional delegation matrix

Staff availability to the site

End-to-end transaction flow

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following steps should be FIRST in developing an information security plan?

Perform a technical vulnerabilities assessment.

Analyze the current business strategy.

Perform a business impact analysis

Assess the current levels of security awareness

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Information security governance is PRIMARILY driven by:

technology constraints

regulatory requirements.

litigation potential.

business strategy.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The FIRST step to create an internal culture that embraces information security is to:

implement stronger controls.

conduct periodic awareness training.

actively monitor operations

gain endorsement from executive management.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?