
CISM 2
Authored by Vaibhavi Sarkar
Other
1st - 3rd Grade
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
When an organization hires a new information security manager, which of the following goals should this individual pursue FIRST?
A. Develop a security architecture
B. Establish good communication with steering committee members
C. Assemble an experienced staff
D. Benchmark peer organizations
Answer explanation
Explanation: New information security managers should seek to build rapport and establish lines of communication with senior management to enlist their support. Benchmarking peer organizations is beneficial to better understand industry best practices, but it is secondary to obtaining senior management support. Similarly, developing a security architecture and assembling an experienced staff are objectives that can be obtained later.
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
It is MOST important that information security architecture be aligned with which of the following?
A. Industry best practices
B. Information technology plans
C. Information security best practices
D. Business objectives and goals
Answer explanation
Explanation: Information security architecture should always be properly aligned with business goals and objectives. Alignment with IT plans or industry and security best practices is secondary by comparison.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following is MOST likely to be discretionary?
A. Policies
B. Procedures
C. Guidelines
D. Standards
Answer explanation
Explanation: Policies define security goals and expectations for an organization. These are defined in more specific terms within standards and procedures. Standards establish what is to be done while procedures describe how it is to be done. Guidelines provide recommendations that business management must consider in developing practices within their areas of control; as such, they are discretionary.
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Security technologies should be selected PRIMARILY on the basis of their:
A. ability to mitigate business risks.
B. evaluations in trade publications.
C. use of new and emerging technologies.
D. benefits in comparison to their costs.
Answer explanation
Explanation: The most fundamental evaluation criterion for the appropriate selection of any security technology is its ability to reduce or eliminate business risks. Investments in security technologies should be based on their overall value in relation to their cost; the value can be demonstrated in terms of risk mitigation. This should take precedence over whether they use new or exotic technologies or how they are evaluated in trade publications.
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following are seldom changed in response to technological changes?
A. Standards
B. Procedures
C. Policies
D. Guidelines
Answer explanation
Explanation: Policies are high-level statements of objectives. Because of their high-level nature and statement of broad operating principles, they are less subject to periodic change. Security standards and procedures as well as guidelines must be revised and updated based on the impact of technology changes.
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
The MOST important factor in planning for the long-term retention of electronically stored business records is to take into account potential changes in:
A. storage capacity and shelf life.
B. regulatory and legal requirements.
C. business strategy and direction.
D. application systems and media.
Answer explanation
Explanation: Long-term retention of business records may be severely impacted by changes in application systems and media. For example, data stored in nonstandard formats that can only be read and interpreted by previously decommissioned applications may be difficult, if not impossible, to recover. Business strategy and direction do not generally apply, nor do legal and regulatory requirements. Storage capacity and shelf life are important but secondary issues.
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following is characteristic of decentralized information security management across a geographically dispersed organization?
A. More uniformity in quality of service
B. Better adherence to policies
C. Better alignment to business unit needs
D. More savings in total operating costs
Answer explanation
Explanation: Decentralization of information security management generally results in better alignment to business unit needs. It is generally more expensive to administer due to the lack of economies of scale. Uniformity in quality of service tends to vary from unit to unit.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
21 questions
DT QUIZIZZ 2.
Quiz
•
1st - 3rd Grade
15 questions
Soal Tes NC Oktober 2023
Quiz
•
1st Grade
15 questions
HIGIENE INDUSTRIAL
Quiz
•
3rd Grade
15 questions
KNOW YOUR COUNTRY
Quiz
•
2nd - 3rd Grade
20 questions
PRIMERA ACTIVIDAD DE COMPRENSIÓN
Quiz
•
1st - 3rd Grade
20 questions
Il sistema scheletrico
Quiz
•
2nd Grade
19 questions
nn5 tl3 Lezen h1 t/m h4
Quiz
•
3rd - 4th Grade
15 questions
MARVEL: SUMMER PARTY
Quiz
•
1st - 3rd Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Other
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
22 questions
fractions
Quiz
•
3rd Grade
10 questions
Groundhog Day Trivia Questions
Interactive video
•
3rd - 6th Grade
18 questions
Comparing Fractions with same numerator or denominator
Quiz
•
3rd Grade
12 questions
Fractions on a numberline review
Quiz
•
3rd Grade
10 questions
Area
Quiz
•
3rd Grade
10 questions
Groundhog Behavior and Hibernation Facts
Interactive video
•
3rd - 5th Grade