Isaca- CISM
| Question ID 16806 |
Who should be responsible for enforcing access rights to application data? |
| Option A |
Data owners |
| Option B |
Business process owners |
| Option C |
The security steering committee |
| Option D |
Security administrators |
| Correct Answer | D |
| Question ID 16807 |
The MOST important component of a privacy policy is: |
| Option A |
notifications. |
| Option B |
warranties. |
| Option C |
liabilities. |
| Option D |
geographic coverage. |
| Correct Answer | A |
| Question ID 16808 |
Investment in security technology and processes should b e based on: |
| Option A |
clear alignment with the goals and objectives of the organization. |
| Option B |
success cases that have been experienced in previous projects. |
| Option C |
best business practices. |
| Option D |
safeguards that are inherent in existing technology. |
| Correct Answer | A |
| Question ID 16809 |
A security manager is preparing a report to obtain the commitment of executive |
| Option A |
Examples of genuine incidents at similar organizations |
| Option B |
Statement of generally accepted best practices |
| Option C |
Associating realistic threats to corporate objectives |
| Option D |
Analysis of current technological exposures |
| Correct Answer | C |
| Question ID 16810 |
When a security standard conflicts with a business objective, the situation should be |
| Option A |
changing the security standard. |
| Option B |
changing the business objective. |
| Option C |
performing a risk analysis. |
| Option D |
authorizing a risk acceptance. |
| Correct Answer | C |
| Question ID 16811 |
Minimum standards for securing the technical infrastructure should be defined in a security: |
| Option A |
strategy. |
| Option B |
guidelines. |
| Option C |
model. |
| Option D |
architecture. |
| Correct Answer | D |
| Question ID 16812 |
An information security manager must understand the relationship between information |
| Option A |
support organizational objectives. |
| Option B |
determine likely areas of noncompliance. |
| Option C |
assess the possible impacts of compromise. |
| Option D |
understand the threats to the business. |
| Correct Answer | A |
| Question ID 16813 |
Which of the following should be the FIRST step in developing an information security |
| Option A |
Perform a technical vulnerabilities assessment |
| Option B |
Analyze the current business strategy |
| Option C |
Perform a business impact analysis |
| Option D |
Assess the current levels of security awareness |
| Correct Answer | B |
| Question ID 16814 |
Information security governance is PRIMARILY driven by: |
| Option A |
technology constraints. |
| Option B |
regulatory requirements. |
| Option C |
litigation potential. |
| Option D |
business strategy. |
| Correct Answer | D |
| Question ID 16815 |
When developing an information security program, what is the MOST useful source of |
| Option A |
Proficiency test |
| Option B |
Job descriptions |
| Option C |
Organization chart |
| Option D |
Skills inventory |
| Correct Answer | D |