CISM Domain 1-17 August

CISM Domain 1-17 August

11th Grade

11 Qs

quiz-placeholder

Similar activities

Understanding Partnership Dissolution

Understanding Partnership Dissolution

11th Grade

10 Qs

Cyber Fraud and Security

Cyber Fraud and Security

11th Grade

8 Qs

Understanding Invitation Letters

Understanding Invitation Letters

11th Grade

15 Qs

Quiz in Q2 Empowerment Technology

Quiz in Q2 Empowerment Technology

11th Grade

10 Qs

External influences on business 1

External influences on business 1

11th Grade

15 Qs

Analysis of Business transaction

Analysis of Business transaction

11th Grade

15 Qs

Ndebele State Political Organization

Ndebele State Political Organization

11th Grade

10 Qs

 Business environment

Business environment

11th Grade

10 Qs

CISM Domain 1-17 August

CISM Domain 1-17 August

Assessment

Quiz

Others

11th Grade

Easy

Created by

Nivedita Newar

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the MOST important consideration when developing an information security strategy?

Regulatory requirements

Organizational objectives

Emerging threats

Technological advancements

Answer explanation

The information security strategy must align with the overall organizational objectives to ensure that security initiatives support the business's goals. While regulatory requirements, emerging threats, and technological advancements are important, they should be considered within the context of the organization's specific objectives.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of establishing an information security governance framework?

To enforce security policies

To ensure compliance with regulations

To align security with business objectives

To mitigate security risks

Answer explanation

The main purpose of an information security governance framework is to ensure that information security strategies and activities align with and support the organization's business objectives. While enforcing policies, ensuring compliance, and mitigating risks are important, they are secondary to alignment with business goals.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following metrics would be the most effective in evaluating the performance of an information security program?

Number of security incidents

Time to resolve security incidents

Alignment with business strategy

Compliance with industry standards

Answer explanation

The effectiveness of an information security program is best measured by how well it supports and aligns with the business strategy. The other metrics are important but focus more on operational aspects rather than strategic alignment.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should be the PRIMARY input for developing an organization's information security strategy?

Historical security incidents

Benchmarking data

Business impact analysis (BIA)

Security architecture review

Answer explanation

The PRIMARY input for developing an organization's information security strategy should be Business Impact Analysis (BIA) as it helps identify critical assets and prioritize security measures based on their impact on the business.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following BEST ensures that information security risks are effectively managed in an organization?

Implementation of technical controls

Periodic security audits

An established risk management process

Comprehensive security awareness training

Answer explanation

An established risk management process is the BEST way to ensure that information security risks are effectively managed in an organization.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The scope of the information security governance program should be determined by:

The size of the organization

The risk appetite of the organization

The number of security incidents

The complexity of the IT environment

Answer explanation

The scope of the information security governance program should be determined by the risk appetite of the organization, as it dictates the level of security measures needed to align with the organization's tolerance for risk.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Business Impact Analysis (BIA) identifies:

Historical security incidents

Benchmarking data

Critical business processes and the impact of disruptions

Security architecture review

Answer explanation

A Business Impact Analysis (BIA) identifies critical business processes and the impact of disruptions, making it the correct choice.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?