You are on page 1of 2

DASHBOARD / CISM PREP / MODULE 1: INFORMATION SECURITY GOVERNANCE / MODULE 1: QUIZ

Started on Tuesday, 9 August 2022, 4:52 AM


State Finished
Completed on Tuesday, 9 August 2022, 4:54 AM
Time taken 2 mins 31 secs
Feedback Congratulations. You have passed this test.

Question 1
The MOST effective way to gain
support for security strategy amongst senior leaders of
an organisation is to: 
Correct

Marked out of 1.00

Select one:
a. Allow a few security incidents to
occur. 

Allow a few security incidents to occur.


b. Increase the number so security staff within the organisation. 
c. Align security strategy with business strategy. 
d. Include anecdotes of fear, uncertainty and doubt in conversations with senior leaders. 

Question 2 In part, information security governance allows organisational leaders to: 

Incorrect

Marked out of 1.00 Select one:


a. Become aware of security risks and decide on the allocation of resources. 
b. Define technical mitigations to system vulnerabilities. 
c. Identify a strategy for vendor selection and return on investment. 
d. Provide security awareness to all relevant staff.

Question 3 Information security policies are intended to: 

Incorrect

Marked out of 1.00 Select one:


a. Provide work instructions for the configuration of operating system security. 

b. Be a source of user awareness training for staff to identify phishing attacks. 


c. Provide high-level security principles for behaviour of personnel. 
d. Be enforced by government legislation. 

Question 4 The information security steering committee is responsible for: 

Correct

Marked out of 1.00 Select one:


a. Reviewing the information security strategy. 
b. Developing a security strategy. 
c. Final approval of information security strategy. 
d. Determining organisational strategy. 
Question 5 The progress of the delivery of a strategy is monitored by: 

Correct

Marked out of 1.00 Select one:


a. The number of security incidents suffered by competitors in the same industry. 
b. The proportion of security budget secured and spent. 
c. The number of staff hired into the security team. 
d. Action plan metrics such as KPIs, CSFs and KGIs. 

You might also like