1. A newly hired information security manager discovers that the cleanup of accounts for terminated employees happens only once a year.Which of the following should be the information security manager's FIRST course of action?
A) Design and document a new process. B) Update the security policy. C) Perform a risk assessment. D) Report the issue to senior management.
2. What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?
A) Agreeing on baseline values for the metrics B) Developing a dashboard for communicating the metrics C) Providing real-time insight on the security posture of the organization D) Benchmarking the expected value of the metrics against industry standards
3. Which of the following is the BEST approach for encouraging business units to assume their roles and responsibilities in an information security program?
A) Perform a risk assessment. B) Conduct an awareness program. C) Conduct a security audit. D) Develop controls and countermeasures.
4. Establishing which of the following is the BEST way of ensuring that the emergence of new risk is promptly identified?
A) Regular risk reporting B) Risk monitoring processes C) Change control procedures D) Incident monitoring activities
5. For a business operating in a competitive and evolving online market, it is MOST important for a security policy to focus on:
A) defining policies for new technologies. B) enabling adoption of new technologies. C) requiring accreditation for new technologies. D) managing risks of new technologies.
Leave a comment