1. When developing an information security governance framework, which of the following would be the MAIN impact when lacking senior management involvement?
A) Accountability for risk treatment is not clearly defined. B) Information security responsibilities are not communicated effectively. C) Resource requirements are not adequately considered. D) Information security plans do not support business requirements.
2. Which of the following is the BEST way to facilitate the alignment between an organization's information security program and business objectives?
A) Information security is considered at the feasibility stage of all IT projects. B) The information security governance committee includes representation from key business areas. C) The chief executive officer reviews and approves the information security program. D) The information security program is audited by the internal audit department.
3. The effectiveness of the information security process is reduced when an outsourcing organization:
A) is responsible for information security governance activities B) receives additional revenue when security service levels are met C) incurs penalties for failure to meet security service-level agreements D) standardizes on a single access-control software product
4. What should be an information security manager's FIRST course of action when an organization is subject to a new regulatory requirement?
A) Perform a gap analysis B) Complete a control assessment C) Submit a business case to support compliance D) Update the risk register
5. Internal audit has reported a number of information security issues which are not in compliance with regulatory requirements. What should the information security manager do FIRST?
A) Create a security exception B) Perform a vulnerability assessment C) Perform a gap analysis to determine needed resources D) Assess the risk to business operations
Leave a comment