
CISM Domain 1-17 August
Authored by Nivedita Newar
Others
11th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the MOST important consideration when developing an information security strategy?
Regulatory requirements
Organizational objectives
Emerging threats
Technological advancements
Answer explanation
The information security strategy must align with the overall organizational objectives to ensure that security initiatives support the business's goals. While regulatory requirements, emerging threats, and technological advancements are important, they should be considered within the context of the organization's specific objectives.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of establishing an information security governance framework?
To enforce security policies
To ensure compliance with regulations
To align security with business objectives
To mitigate security risks
Answer explanation
The main purpose of an information security governance framework is to ensure that information security strategies and activities align with and support the organization's business objectives. While enforcing policies, ensuring compliance, and mitigating risks are important, they are secondary to alignment with business goals.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following metrics would be the most effective in evaluating the performance of an information security program?
Number of security incidents
Time to resolve security incidents
Alignment with business strategy
Compliance with industry standards
Answer explanation
The effectiveness of an information security program is best measured by how well it supports and aligns with the business strategy. The other metrics are important but focus more on operational aspects rather than strategic alignment.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following should be the PRIMARY input for developing an organization's information security strategy?
Historical security incidents
Benchmarking data
Business impact analysis (BIA)
Security architecture review
Answer explanation
The PRIMARY input for developing an organization's information security strategy should be Business Impact Analysis (BIA) as it helps identify critical assets and prioritize security measures based on their impact on the business.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following BEST ensures that information security risks are effectively managed in an organization?
Implementation of technical controls
Periodic security audits
An established risk management process
Comprehensive security awareness training
Answer explanation
An established risk management process is the BEST way to ensure that information security risks are effectively managed in an organization.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The scope of the information security governance program should be determined by:
The size of the organization
The risk appetite of the organization
The number of security incidents
The complexity of the IT environment
Answer explanation
The scope of the information security governance program should be determined by the risk appetite of the organization, as it dictates the level of security measures needed to align with the organization's tolerance for risk.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Business Impact Analysis (BIA) identifies:
Historical security incidents
Benchmarking data
Critical business processes and the impact of disruptions
Security architecture review
Answer explanation
A Business Impact Analysis (BIA) identifies critical business processes and the impact of disruptions, making it the correct choice.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Miss Azizah's Game
Quiz
•
11th Grade
10 questions
Centers for Medicare & Medicaid Services (CMS)
Quiz
•
9th - 12th Grade
10 questions
Comprehension quiz for Lesson 7
Quiz
•
9th - 12th Grade
15 questions
Heart of Darkness Quiz
Quiz
•
11th Grade
15 questions
kuis Menilai Karya Melalui Resensi Desi
Quiz
•
11th Grade
10 questions
BILAL BIN RABAH
Quiz
•
9th - 12th Grade
15 questions
analytical exposition
Quiz
•
11th Grade
16 questions
Parts of the body
Quiz
•
11th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Others
15 questions
Making Inferences
Quiz
•
7th - 12th Grade
23 questions
TSI Math Vocabulary
Quiz
•
10th - 12th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
15 questions
ACT Reading Practice
Quiz
•
11th Grade
80 questions
ACT Math Important Vocabulary
Quiz
•
11th Grade
20 questions
SSS/SAS
Quiz
•
9th - 12th Grade
16 questions
ACT English - Grammar Practice #2
Quiz
•
11th Grade
12 questions
Unit 8: The Early Cold War
Quiz
•
11th Grade