CISM 2

CISM 2

1st - 3rd Grade

20 Qs

quiz-placeholder

Similar activities

I. Network and Data Communication Basics

I. Network and Data Communication Basics

KG - 5th Grade

15 Qs

CISM 4

CISM 4

1st - 3rd Grade

20 Qs

UIL Chess Quiz 2018/2019

UIL Chess Quiz 2018/2019

2nd - 5th Grade

20 Qs

MAPEH 3 - UNIT TEST

MAPEH 3 - UNIT TEST

3rd Grade

20 Qs

3.9 Menerapkan prosedur rapat

3.9 Menerapkan prosedur rapat

1st Grade

20 Qs

Topic 1

Topic 1

1st Grade

15 Qs

Accidentals & Key Signatures II

Accidentals & Key Signatures II

KG - University

22 Qs

ICT Quiz CH:1.6

ICT Quiz CH:1.6

KG - Professional Development

15 Qs

CISM 2

CISM 2

Assessment

Quiz

Other

1st - 3rd Grade

Medium

Created by

Vaibhavi Sarkar

Used 9+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

When an organization hires a new information security manager, which of the following goals should this individual pursue FIRST?

A. Develop a security architecture

B. Establish good communication with steering committee members

C. Assemble an experienced staff

D. Benchmark peer organizations

Answer explanation

Explanation: New information security managers should seek to build rapport and establish lines of communication with senior management to enlist their support. Benchmarking peer organizations is beneficial to better understand industry best practices, but it is secondary to obtaining senior management support. Similarly, developing a security architecture and assembling an experienced staff are objectives that can be obtained later.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

It is MOST important that information security architecture be aligned with which of the following?

A. Industry best practices

B. Information technology plans

C. Information security best practices

D. Business objectives and goals

Answer explanation

Explanation: Information security architecture should always be properly aligned with business goals and objectives. Alignment with IT plans or industry and security best practices is secondary by comparison.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is MOST likely to be discretionary?

A. Policies

B. Procedures

C. Guidelines

D. Standards

Answer explanation

Explanation: Policies define security goals and expectations for an organization. These are defined in more specific terms within standards and procedures. Standards establish what is to be done while procedures describe how it is to be done. Guidelines provide recommendations that business management must consider in developing practices within their areas of control; as such, they are discretionary.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Security technologies should be selected PRIMARILY on the basis of their:

A. ability to mitigate business risks.

B. evaluations in trade publications.

C. use of new and emerging technologies.

D. benefits in comparison to their costs.

Answer explanation

Explanation: The most fundamental evaluation criterion for the appropriate selection of any security technology is its ability to reduce or eliminate business risks. Investments in security technologies should be based on their overall value in relation to their cost; the value can be demonstrated in terms of risk mitigation. This should take precedence over whether they use new or exotic technologies or how they are evaluated in trade publications.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following are seldom changed in response to technological changes?

A. Standards

B. Procedures

C. Policies

D. Guidelines

Answer explanation

Explanation: Policies are high-level statements of objectives. Because of their high-level nature and statement of broad operating principles, they are less subject to periodic change. Security standards and procedures as well as guidelines must be revised and updated based on the impact of technology changes.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The MOST important factor in planning for the long-term retention of electronically stored business records is to take into account potential changes in:

A. storage capacity and shelf life.

B. regulatory and legal requirements.

C. business strategy and direction.

D. application systems and media.

Answer explanation

Explanation: Long-term retention of business records may be severely impacted by changes in application systems and media. For example, data stored in nonstandard formats that can only be read and interpreted by previously decommissioned applications may be difficult, if not impossible, to recover. Business strategy and direction do not generally apply, nor do legal and regulatory requirements. Storage capacity and shelf life are important but secondary issues.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is characteristic of decentralized information security management across a geographically dispersed organization?

A. More uniformity in quality of service

B. Better adherence to policies

C. Better alignment to business unit needs

D. More savings in total operating costs

Answer explanation

Explanation: Decentralization of information security management generally results in better alignment to business unit needs. It is generally more expensive to administer due to the lack of economies of scale. Uniformity in quality of service tends to vary from unit to unit.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?