CISM 4

CISM 4

1st - 3rd Grade

20 Qs

quiz-placeholder

Similar activities

AWS Cloud Practitioner RELX Quiz 2

AWS Cloud Practitioner RELX Quiz 2

1st Grade

15 Qs

Cyber Security

Cyber Security

1st Grade - Professional Development

25 Qs

Module 4 QUIZ

Module 4 QUIZ

1st Grade

20 Qs

SEM 1 - Objective 2.00 Review

SEM 1 - Objective 2.00 Review

KG - 12th Grade

15 Qs

HR terms every HR should know

HR terms every HR should know

1st - 4th Grade

15 Qs

CISM 2

CISM 2

1st - 3rd Grade

20 Qs

CISM 5

CISM 5

1st - 3rd Grade

20 Qs

CISM 4

CISM 4

Assessment

Quiz

Other

1st - 3rd Grade

Medium

Created by

Vaibhavi Sarkar

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An information security manager at a global organization has to ensure that the local information security program will initially ensure compliance with the:

A. corporate data privacy policy.

B. data privacy policy where data are collected.

C. data privacy policy of the headquarters' country.

D. data privacy directive applicable globally.

Answer explanation

Explanation: As a subsidiary, the local entity will have to comply with the local law for data collected in the country. Senior management will be accountable for this legal compliance. The policy, being internal, cannot supersede the local law. Additionally, with local regulations differing from the country in which the organization is headquartered, it is improbable that a group wide policy will address all the local legal requirements. In case of data collected locally (and potentially transferred to a country with a different data privacy regulation), the local law applies, not the law applicable to the head office. The data privacy laws are country-specific.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A new regulation for safeguarding information processed by a specific type of transaction has come to the attention of an information security officer. The officer should FIRST:

A. meet with stakeholders to decide how to comply.

B. analyze key risks in the compliance process.

C. assess whether existing controls meet the regulation.

D. update the existing security/privacy policy.

Answer explanation

Explanation: If the organization is in compliance through existing controls, the need to perform other work related to the regulation is not a priority. The other choices are appropriate and important; however, they are actions that are subsequent and will depend on whether there is an existing control gap.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The PRIMARY objective of a security steering group is to:

A. ensure information security covers all business functions.

B. ensure information security aligns with business goals.

C. raise information security awareness across the organization.

D. implement all decisions on security management across the organization.

Answer explanation

Explanation: The security steering group comprises senior management of key business functions and has the primary objective to align the security strategy with the business direction. Option A is incorrect because all business areas may not be required to be covered by information security; but, if they do, the main purpose of the steering committee would be alignment more so than coverage. While raising awareness is important, this goal would not be carried out by the committee itself. The steering committee may delegate part of the decision making to the information security manager; however, if it retains this authority, it is not the primary' goal.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Data owners must provide a safe and secure environment to ensure confidentiality, integrity and availability of the transaction. This is an example of an information security:

A. baseline.

B. strategy.

C. procedure.

D. policy.

Answer explanation

Explanation: A policy is a high-level statement of an organization's beliefs, goals, roles and objectives. Baselines assume a minimum security level throughout an organization. The information security strategy aligns the information security program with business objectives rather than making control statements. A procedure is a step-by- step process of how policy and standards will be implemented.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

At what stage of the applications development process should the security department initially become involved?

A. When requested

B. At testing

C. At programming

D. At detail requirements

Answer explanation

Explanation: Information security has to be integrated into the requirements of the application's design. It should also be part of the information security governance of the organization. The application owner may not make a timely request for security involvement. It is too late during systems testing, since the requirements have already been agreed upon. Code reviews are part of the final quality assurance process.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A security manager is preparing a report to obtain the commitment of executive management to a security program. Inclusion of which of the following would be of MOST value?

A. Examples of genuine incidents at similar organizations

B. Statement of generally accepted best practices

C. Associating realistic threats to corporate objectives

D. Analysis of current technological exposures

Answer explanation

Explanation: Linking realistic threats to key business objectives will direct executive attention to them. All other options are supportive but not of as great a value as choice C when trying to obtain the funds for a new program.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

When personal information is transmitted across networks, there MUST be adequate controls over:

A. change management.

B. privacy protection.

C. consent to data transfer.

D. encryption devices.

Answer explanation

Explanation: Privacy protection is necessary to ensure that the receiving party has the appropriate level of protection of personal data. Change management primarily protects only the information, not the privacy of the individuals. Consent is one of the protections that is frequently, but not always, required. Encryption is a method of achieving the actual control, but controls over the devices may not ensure adequate privacy protection and, therefore, is a partial answer.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?