
ISC Review
Authored by MARK PARPAN
Business
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Q1. Which of the following best describes the primary difference between IT governance and IT management?
IT governance focuses on operational execution while IT management establishes strategic direction
IT governance establishes strategic direction and decision-making authority while IT management focuses on day-to-day operations
IT governance is performed by technical staff while IT management is performed by business executives
IT governance manages technology infrastructure while IT management handles business processes
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Q4. According to the COBIT 2019 framework, which domain focuses on measuring IT performance and assessing whether governance and management processes operate effectively?
Align, Plan, and Organise
Build, Acquire, and Implement
Deliver, Service, and Support
Monitor, Evaluate, and Assess
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Q7. In the COSO Enterprise Risk Management Framework, which component establishes the foundation through board oversight, operating structures, and organizational culture?
Strategy and Objective-Setting
Governance and Culture
Performance
Review and Revision
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Q13. In the NIST Cybersecurity Framework, which function focuses on implementing capabilities to identify cybersecurity events promptly?
Identify
Protect
Detect
Respond
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Q16. According to COBIT's design factors methodology, which of the following is NOT one of the factors used to customize governance systems?
Enterprise size
Employee satisfaction scores
Threat landscape
Compliance requirements
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Q19. What is the primary benefit of implementing zero trust architecture compared to traditional security models?
Zero trust eliminates all security threats
Zero trust requires continuous verification regardless of location rather than assuming network-based trust
Zero trust is less expensive to implement
Zero trust removes the need for authentication
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Q21. What type of risk assessment uses descriptive scales such as low, medium, and high to rate likelihood and impact based on expert judgment?
Quantitative risk assessment
Qualitative risk assessment
Scenario-based assessment
Probabilistic assessment
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?