Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Take this free Cloud+ quiz to find out if you’re ready for Cloud+ training:
CISM Practice Exam
Step 1 of 11
What is the importance on management oversight in an Information Security Program?
Ensures that the program is well communicated throughout the company
Ensures that the company is protected by the program
Ensures that personnel adhere to the policies
Ensures fulfillment of the requirements and consistency with strategic direction
Which of the following is NOT true?
Every organization has a level of risk it will accept
Risk is an inherent part of the business
All of the answers are not true
Risk can be totally eradicated through resolving all vulnerabilities and setting up layered security defenses
Which of the following shows that senior management understands the importance of security governance into the overall enterprise governance framework?
The company has a Chief Information Security Officer
Information security has its own section on the employee manual
End users are scared to violate company security policies and standards
Employees related to information security are well paid
What should be determined in order to eradicate a particular incident?
Intent of the attacker
What is considered as the basis for the Information Security Program action plan?
Business Impact Analysis
Who must have an important involvement on the security program and should sign off on acceptable risk levels?
Incident Response Management
Information Security Management
What is the result when a specific threat tends to affect a large number of vulnerabilities which in effect constitutes to a significant impact?
Spike in risk criticality
Company wide security issue
Over reaction of established security controls and countermeasures
This senior management branch ensures that all impacted stakeholders are involved in the information security process.
Incident response team
Board of directors
How can the risk management process ensure that changing threats and vulnerabilities are addressed in a timely manner?
Incorporating of a change management system to the process
Personnel should always be briefed regarding the established process
Consistent log monitoring and analysis
The process should be continuous and dynamic
Which of the following is not a part or does not affect information security?
Clients' personal information
Company's books of accounts
Print outs on a printing/copier machine
None of the selection
Confirm Your Email to See Your Score!