Isaca- CISM
Question ID 16806 |
Who should be responsible for enforcing access rights to application data? |
Option A |
Data owners |
Option B |
Business process owners |
Option C |
The security steering committee |
Option D |
Security administrators |
Correct Answer | D |
Question ID 16807 |
The MOST important component of a privacy policy is: |
Option A |
notifications. |
Option B |
warranties. |
Option C |
liabilities. |
Option D |
geographic coverage. |
Correct Answer | A |
Question ID 16808 |
Investment in security technology and processes should b e based on: |
Option A |
clear alignment with the goals and objectives of the organization. |
Option B |
success cases that have been experienced in previous projects. |
Option C |
best business practices. |
Option D |
safeguards that are inherent in existing technology. |
Correct Answer | A |
Question ID 16809 |
A security manager is preparing a report to obtain the commitment of executive |
Option A |
Examples of genuine incidents at similar organizations |
Option B |
Statement of generally accepted best practices |
Option C |
Associating realistic threats to corporate objectives |
Option D |
Analysis of current technological exposures |
Correct Answer | C |
Question ID 16810 |
When a security standard conflicts with a business objective, the situation should be |
Option A |
changing the security standard. |
Option B |
changing the business objective. |
Option C |
performing a risk analysis. |
Option D |
authorizing a risk acceptance. |
Correct Answer | C |
Question ID 16811 |
Minimum standards for securing the technical infrastructure should be defined in a security: |
Option A |
strategy. |
Option B |
guidelines. |
Option C |
model. |
Option D |
architecture. |
Correct Answer | D |
Question ID 16812 |
An information security manager must understand the relationship between information |
Option A |
support organizational objectives. |
Option B |
determine likely areas of noncompliance. |
Option C |
assess the possible impacts of compromise. |
Option D |
understand the threats to the business. |
Correct Answer | A |
Question ID 16813 |
Which of the following should be the FIRST step in developing an information security |
Option A |
Perform a technical vulnerabilities assessment |
Option B |
Analyze the current business strategy |
Option C |
Perform a business impact analysis |
Option D |
Assess the current levels of security awareness |
Correct Answer | B |
Question ID 16814 |
Information security governance is PRIMARILY driven by: |
Option A |
technology constraints. |
Option B |
regulatory requirements. |
Option C |
litigation potential. |
Option D |
business strategy. |
Correct Answer | D |
Question ID 16815 |
When developing an information security program, what is the MOST useful source of |
Option A |
Proficiency test |
Option B |
Job descriptions |
Option C |
Organization chart |
Option D |
Skills inventory |
Correct Answer | D |