

Information Security Management Exam Practice Tests
Course Introduction
Information Security Management focuses on the strategies, policies, and procedures necessary to protect an organizations information assets from threats and vulnerabilities. This course covers core concepts such as risk assessment, security frameworks, legal and ethical considerations, and the development of effective security programs. Students will explore key areas like access control, incident response, security auditing, and compliance with industry standards and regulations. Emphasis is placed on aligning security practices with business objectives to ensure organizational resilience in the face of evolving cyber threats.
Recommended Textbook
Disaster Recovery Principles and Practices 1st Edition by April Wells
Available Study Resources on Quizplus
9 Chapters
251 Verified Questions
251 Flashcards
Source URL: https://quizplus.com/study-set/2239

Page 2

Chapter 1: Introduction to Disaster Recovery
Available Study Resources on Quizplus for this Chatper
23 Verified Questions
23 Flashcards
Source URL: https://quizplus.com/quiz/44514
Sample Questions
Q1) Disaster recovery typically looks at the __________.
A)long run
B)continuation of the business
C)overall business plan
D)short term
Answer: D
Q2) Customers and clients will have __________ in the outcome of the disaster recovery.
A)an important role
B)a direct interest
C)no interest
D)no effect
Answer: B
Q3) __________ may gain a competitive advantage as customers seek products and services the affected company can no longer provide.
Answer: Competitors
Q4) __________ can get in without any notice through standard ports that are left open.
Answer: Hackers
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Preparing to Develop the Disaster Recovery Plan
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/44515
Sample Questions
Q1) Damage Assessment Team
A) maintains shipping
B) first responders
C) physically secures backup materials
D) provides assistance to end-users
E) ensures interests of the
Answer: B
Q2) The __________ for the disaster recovery plan is one of the most important steps,and a step that can't be skipped.
Answer: preparation
Q3) Who will be responsible for creating the disaster recovery plan and will likely be responsible for testing it and keeping up with its ongoing maintenance?
A)The disaster recovery team
B)Upper management
C)The disaster recovery planning team
D)The insurance company
Answer: C
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Assessing Risk and Impact
Available Study Resources on Quizplus for this Chatper
43 Verified Questions
43 Flashcards
Source URL: https://quizplus.com/quiz/44516
Sample Questions
Q1) One of the first considerations in the business impact analysis is the __________.
A)assets that are vulnerable
B)service-level agreements that the organization must meet C)risks
D)hazards
Answer: B
Q2) Third
A)assess hazards
B)implement controls
C)test and evaluate
D)identify hazards
E)develop controls and make risk decisions
Answer: E
Q3) In __________ process,rather than identifying the assets and disasters and then driving the process from those perspectives,you address the whole organization from the perspective of the perceived threats.
Answer: The Business Impact Analysis
Q4) A(n)__________ is anything that can cause harm. Answer: hazard
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Prioritizing Systems and Functions for Recovery
Available Study Resources on Quizplus for this Chatper
21 Verified Questions
21 Flashcards
Source URL: https://quizplus.com/quiz/44517
Sample Questions
Q1) The difference between a situation that may simply be an inconvenience and one that is an actual disaster often depends on __________.
A)the severity of the situation
B)the point of view of those affected
C)the point of view of those responsible for declaring the disaster
D)All of the above
Q2) Conducting a(n)__________ of the disaster recovery documentation for accuracy should be a standard practice for the organization.
A)weekly audit
B)daily check
C)annual review
D)restructuring
Q3) Tier ________ is a set of functions and processes that an organization can do without for more than a week to 10 days.
Q4) Once you have determined the assets as well as processes and functions of an organization,it is time to determine what _____________ is assigned to each of the different aspects so that the organization can recover its business.
Q5) Not every "event" impacting an organization can be considered a(n)__________.
To view all questions and flashcards with answers, click on the resource link above.
Page 6

Chapter 5: Identify Data Storage and Recovery Sites
Available Study Resources on Quizplus for this Chatper
23 Verified Questions
23 Flashcards
Source URL: https://quizplus.com/quiz/44518
Sample Questions
Q1) Which of the following provides the fastest backup scenario?
A)Full backups
B)Incremental backups
C)Differential backups
D)Mirror backups
Q2) Restoring an entire tape is __________ labor and time intensive than recovering a single deleted file.
Q3) The data or documentation that is necessary for normal daily operations of the organization but for which there are alternative sources of the same data or data that can be easily reconstructed is known as ________________.
Q4) Travel cost may be even more of a consideration than the __________ of the contracted recovery site.
Q5) In the end,the decision to rent or share a recovery site comes down to __________.
Q6) Real-time data transfer occurs between the primary and the __________ backup site,which means that the site must be contracted continuously or that the company must own both the sites.
Q7) It is important when doing your disaster recovery testing that you test with a(n)__________ backup.
Page 7
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Developing Plans, Procedures, and Relationships
Available Study Resources on Quizplus for this Chatper
23 Verified Questions
23 Flashcards
Source URL: https://quizplus.com/quiz/44519
Sample Questions
Q1) Which of the following is an example of an upstream relationship?
A)clients
B)suppliers
C)competitors
D)all of the above
Q2) No matter how many scenarios and situations may be included,it is likely that one or more will be__________.
Q3) Disaster recovery planning isn't only concerned with the disasters that might befall the organization,but the organization's __________ as well.
Q4) Which of the following is considered a support tool in disaster recovery?
A)contact information for computer vendors
B)completed questionnaires verifying that the vendors are planning for their own disaster recovery
C)list of customers
D)contact information for upper management
Q5) One of the most important documents you will need as support for the disaster recovery team is the __________.
Q6) It is often the case that software is licensed for a particular __________ configuration.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Developing Procedures for Special Circumstances
Available Study Resources on Quizplus for this Chatper
20 Verified Questions
20 Flashcards
Source URL: https://quizplus.com/quiz/44520
Sample Questions
Q1) __________ can happen at any time,even when you're already in the midst of one.
Q2) Which of the following is the best test scenario?
A)The recovery team is notified one week in advance of a disaster drill.
B)The recovery team is not sure if the situation is a drill or an actual disaster.
C)The recovery team is awakened in the middle of the night to initiate a disaster drill.
D)The recovery team knows the dates of disaster drills which are scheduled twice a year.
Q3) In later testing efforts,it is often beneficial to have __________ individuals placed into roles for which they may not be well suited.
Q4) It is possible to word __________ in such a way as to make sure that the organization is covered in the eventuality that an emergency within an emergency should present itself.
Q5) How are gaps in a recovery plan typically found?
A)During a declared disaster
B)Observing how other businesses react to a disaster
C)In the cycle of planning,backing up,testing recovery,and restarting the cycle
D)All of the above
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Testing the Disaster Recovery Plan
Available Study Resources on Quizplus for this Chatper
25 Verified Questions
25 Flashcards
Source URL: https://quizplus.com/quiz/44521
Sample Questions
Q1) The smaller the company the __________ likely it will be that change control will be applied to the disaster recovery document when new software or hardware is acquired or retired.
Q2) What is the main reason organizations give for not testing the recovery plan?
A)it is a drain on time and resources
B)they have confidence in the plan
C)it provides motivation for maintaining and updating the recovery plan
D)it may reveal gaps in the plan
Q3) How often should the disaster recovery team have scheduled meetings?
A)weekly
B)monthly
C)semiannually
D)annually
Q4) Through testing,it is possible to provide proof that the organization can recover from a disaster in a(n)_________ manner.
Q5) The disaster recovery test needs to have a set of __________so everyone knows whether the plan and the team have passed.
Q6) Typically,there are times when pieces of the recovery plan are __________ from the change control process.
Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Continued Assessment of Needs, Threats, and Solutions
Available Study Resources on Quizplus for this Chatper
21 Verified Questions
21 Flashcards
Source URL: https://quizplus.com/quiz/44522
Sample Questions
Q1) The meetings about changes that need to be made should occur as soon as possible __________ the recovery test.
Q2) Which of the following is a tool that not only exposes threats to an organization,but points out strengths as well?
A)Denial of Service
B)SWOT analysis
C)Threat tree
D)Repudiation
Q3) Which threat analysis involves the use of backdoors?
A)Discoverable
B)Users/Systems Affected
C)Exploitable
D)Reproducible.
Q4) Any attack that gains someone information can result in that information being used to __________ others into revealing even more information to the hacker or to trusting that person with business to which they should not be a party.
Q5) __________ in some operating systems are well known by some people,and they are more than capable of testing systems to see if one is open.
To view all questions and flashcards with answers, click on the resource link above. Page 11