Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
CISM Exam Prep Assessment
Take this free CISM Exam Prep quiz to find out if you’re ready for CISM Exam Prep training:
CISM Practice Exam
Step 1 of 11
Which of the following is not a part or does not affect information security?
None of the selection
Clients' personal information
Company's books of accounts
Print outs on a printing/copier machine
What is the result when a specific threat tends to affect a large number of vulnerabilities which in effect constitutes to a significant impact?
Over reaction of established security controls and countermeasures
Company wide security issue
Spike in risk criticality
What should be determined in order to eradicate a particular incident?
Intent of the attacker
Which of the following shows that senior management understands the importance of security governance into the overall enterprise governance framework?
The company has a Chief Information Security Officer
End users are scared to violate company security policies and standards
Employees related to information security are well paid
Information security has its own section on the employee manual
What is considered as the basis for the Information Security Program action plan?
Business Impact Analysis
Who must have an important involvement on the security program and should sign off on acceptable risk levels?
Information Security Management
Incident Response Management
What is the importance on management oversight in an Information Security Program?
Ensures that the program is well communicated throughout the company
Ensures that the company is protected by the program
Ensures that personnel adhere to the policies
Ensures fulfillment of the requirements and consistency with strategic direction
This senior management branch ensures that all impacted stakeholders are involved in the information security process.
Incident response team
Board of directors
How can the risk management process ensure that changing threats and vulnerabilities are addressed in a timely manner?
Incorporating of a change management system to the process
Personnel should always be briefed regarding the established process
The process should be continuous and dynamic
Consistent log monitoring and analysis
Which of the following is NOT true?
Every organization has a level of risk it will accept
Risk is an inherent part of the business
All of the answers are not true
Risk can be totally eradicated through resolving all vulnerabilities and setting up layered security defenses
Confirm Your Email to See Your Score!