
CISM Day1
Authored by Omantel Ohi
Computers
Professional Development
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following requirements would have the lowest level of priority in information security?
Technical
Regulatory
Privacy
Business
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The PRIMARY goal in developing an information security strategy is to:
establish security metrics and performance monitoring
educate business process owners regarding their duties
ensure that legal and regulatory requirements are met.
support the business objectives of the organization
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Senior management commitment and support for information security can BEST be enhanced through:
a formal security policy sponsored by the chief executive officer (CEO).
regular security awareness training for employees.
periodic review of alignment with business management goals.
senior management signoff on the information security strategy
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following MOST commonly falls within the scope of an information security governance steering committee?
Interviewing candidates for information security specialist positions
Developing content for security awareness programs
Prioritizing information security initiatives
Approving access to critical financial systems
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is the MOST important factor when designing information security architecture?
Technical platform interfaces
Scalability of the network
Development methodologies
Stakeholder requirements
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
What will have the HIGHEST impact on standard information security governance models?
Number of employees
Distance between physical locations
Complexity of organizational structure
Organizational budget
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In order to highlight to management the importance of integrating information security in the business processes, a newly hired information security officer should
FIRST:
prepare a security budget.
conduct a risk assessment.
develop an information security policy.
obtain benchmarking information.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?