CISM 3

CISM 3

1st - 3rd Grade

20 Qs

quiz-placeholder

Similar activities

CISM 5

CISM 5

1st - 3rd Grade

20 Qs

Dangerous Goods Quiz

Dangerous Goods Quiz

1st - 5th Grade

19 Qs

NGR INVICTUS

NGR INVICTUS

2nd Grade

20 Qs

Topic 1

Topic 1

1st Grade

15 Qs

QUIZIZZ DAY 1

QUIZIZZ DAY 1

1st - 6th Grade

20 Qs

I. Network and Data Communication Basics

I. Network and Data Communication Basics

KG - 5th Grade

15 Qs

Pre Test Project Management

Pre Test Project Management

1st Grade

15 Qs

CISM 4

CISM 4

1st - 3rd Grade

20 Qs

CISM 3

CISM 3

Assessment

Quiz

Other

1st - 3rd Grade

Medium

Created by

Vaibhavi Sarkar

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The chief information security officer (CISO) should ideally have a direct reporting relationship to the:

A. head of internal audit.

B. chief operations officer (COO).

C. chief technology officer (CTO).

D. legal counsel.

Answer explanation

Explanation: The chief information security officer (CISO) should ideally report to as high a level within the organization as possible. Among the choices given, the chief operations officer (COO) would have not only the appropriate level but also the knowledge of day-to-day operations. The head of internal audit and legal counsel would make good secondary choices, although they would not be as knowledgeable of the operations. Reporting to the chief technology officer (CTO) could become problematic as the CTO's goals for the infrastructure might, at times, run counter to the goals of information security.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the MOST essential task for a chief information security officer (CISO) to perform?

A. Update platform-level security settings

B. Conduct disaster recovery test exercises

C. Approve access to critical financial systems

D. Develop an information security strategy paper

Answer explanation

Explanation: Developing a strategy paper on information security would be the most appropriate. Approving access would be the job of the data owner. Updating platform-level security and conducting recovery test exercises would be less essential since these are administrative tasks.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Developing a successful business case for the acquisition of information security software products can BEST be assisted by:

A. assessing the frequency of incidents.

B. quantifying the cost of control failures.

C. calculating return on investment (ROI) projections.

D. comparing spending against similar organizations.

Answer explanation

Explanation: Calculating the return on investment (ROI) will most closely align security with the impact on the bottom line. Frequency and cost of incidents are factors that go into determining the impact on the business but, by themselves, are insufficient. Comparing spending against similar organizations can be problematic since similar organizations may have different business goals and appetites for risk.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

When an information security manager is developing a strategic plan for information security, the timeline for the plan should be:

A. aligned with the IT strategic plan.

B. based on the current rate of technological change.

C. three-to-five years for both hardware and software.

D. aligned with the business strategy.

Answer explanation

Explanation: Any planning for information security should be properly aligned with the needs of the business. Technology should not come before the needs of the business, nor should planning be done on an artificial timetable that ignores business needs.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the MOST important information to include in a strategic plan for information security?

A. Information security staffing requirements

B. Current state and desired future state

C. IT capital investment requirements

D. information security mission statement

Answer explanation

Explanation: It is most important to paint a vision for the future and then draw a road map from the stalling point to the desired future state. Staffing, capital investment and the mission all stem from this foundation.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Information security projects should be prioritized on the basis of:

A. time required for implementation.

B. impact on the organization.

C. total cost for implementation.

D. mix of resources required.

Answer explanation

Explanation: Information security projects should be assessed on the basis of the positive impact that they will have on the organization. Time, cost and resource issues should be subordinate to this objective.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the MOST important information to include in an information security standard?

A. Creation date

B. Author name

C. Initial draft approval date

D. Last review date

Answer explanation

Explanation: The last review date confirms the currency of the standard, affirming that management has reviewed the standard to assure that nothing in the environment has changed that would necessitate an update to the standard. The name of the author as well as the creation and draft dates are not that important.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?