An information security manager at a global organization has to ensure that the local information security program will initially ensure compliance with the:
CISM 4

Quiz
•
Other
•
1st - 3rd Grade
•
Medium
Vaibhavi Sarkar
Used 3+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A. corporate data privacy policy.
B. data privacy policy where data are collected.
C. data privacy policy of the headquarters' country.
D. data privacy directive applicable globally.
Answer explanation
Explanation: As a subsidiary, the local entity will have to comply with the local law for data collected in the country. Senior management will be accountable for this legal compliance. The policy, being internal, cannot supersede the local law. Additionally, with local regulations differing from the country in which the organization is headquartered, it is improbable that a group wide policy will address all the local legal requirements. In case of data collected locally (and potentially transferred to a country with a different data privacy regulation), the local law applies, not the law applicable to the head office. The data privacy laws are country-specific.
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A new regulation for safeguarding information processed by a specific type of transaction has come to the attention of an information security officer. The officer should FIRST:
A. meet with stakeholders to decide how to comply.
B. analyze key risks in the compliance process.
C. assess whether existing controls meet the regulation.
D. update the existing security/privacy policy.
Answer explanation
Explanation: If the organization is in compliance through existing controls, the need to perform other work related to the regulation is not a priority. The other choices are appropriate and important; however, they are actions that are subsequent and will depend on whether there is an existing control gap.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
The PRIMARY objective of a security steering group is to:
A. ensure information security covers all business functions.
B. ensure information security aligns with business goals.
C. raise information security awareness across the organization.
D. implement all decisions on security management across the organization.
Answer explanation
Explanation: The security steering group comprises senior management of key business functions and has the primary objective to align the security strategy with the business direction. Option A is incorrect because all business areas may not be required to be covered by information security; but, if they do, the main purpose of the steering committee would be alignment more so than coverage. While raising awareness is important, this goal would not be carried out by the committee itself. The steering committee may delegate part of the decision making to the information security manager; however, if it retains this authority, it is not the primary' goal.
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Data owners must provide a safe and secure environment to ensure confidentiality, integrity and availability of the transaction. This is an example of an information security:
A. baseline.
B. strategy.
C. procedure.
D. policy.
Answer explanation
Explanation: A policy is a high-level statement of an organization's beliefs, goals, roles and objectives. Baselines assume a minimum security level throughout an organization. The information security strategy aligns the information security program with business objectives rather than making control statements. A procedure is a step-by- step process of how policy and standards will be implemented.
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
At what stage of the applications development process should the security department initially become involved?
A. When requested
B. At testing
C. At programming
D. At detail requirements
Answer explanation
Explanation: Information security has to be integrated into the requirements of the application's design. It should also be part of the information security governance of the organization. The application owner may not make a timely request for security involvement. It is too late during systems testing, since the requirements have already been agreed upon. Code reviews are part of the final quality assurance process.
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A security manager is preparing a report to obtain the commitment of executive management to a security program. Inclusion of which of the following would be of MOST value?
A. Examples of genuine incidents at similar organizations
B. Statement of generally accepted best practices
C. Associating realistic threats to corporate objectives
D. Analysis of current technological exposures
Answer explanation
Explanation: Linking realistic threats to key business objectives will direct executive attention to them. All other options are supportive but not of as great a value as choice C when trying to obtain the funds for a new program.
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
When personal information is transmitted across networks, there MUST be adequate controls over:
A. change management.
B. privacy protection.
C. consent to data transfer.
D. encryption devices.
Answer explanation
Explanation: Privacy protection is necessary to ensure that the receiving party has the appropriate level of protection of personal data. Change management primarily protects only the information, not the privacy of the individuals. Consent is one of the protections that is frequently, but not always, required. Encryption is a method of achieving the actual control, but controls over the devices may not ensure adequate privacy protection and, therefore, is a partial answer.
Create a free account and access millions of resources
Similar Resources on Quizizz
17 questions
Media Review!!

Quiz
•
KG - University
20 questions
Poverty

Quiz
•
1st - 2nd Grade
18 questions
LEI LGPD Quiz

Quiz
•
3rd Grade
16 questions
Database Design Quiz 1

Quiz
•
1st Grade
20 questions
Leadership and Management

Quiz
•
KG - University
15 questions
Principle of Management DPB10023

Quiz
•
3rd Grade
17 questions
N4/5 Admin - Security

Quiz
•
3rd Grade
15 questions
I. Network and Data Communication Basics

Quiz
•
KG - 5th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade
Discover more resources for Other
5 questions
Basement Basketball

Quiz
•
3rd Grade
20 questions
Parts of Speech

Quiz
•
3rd - 6th Grade
20 questions
Fun Trivia

Quiz
•
2nd - 4th Grade
16 questions
Animals

Quiz
•
2nd Grade
20 questions
Context Clues

Quiz
•
3rd Grade
20 questions
Kids Movie Trivia

Quiz
•
3rd Grade
20 questions
Synonyms and Antonyms

Quiz
•
2nd Grade
13 questions
Multiplication Facts Practice

Quiz
•
3rd Grade