Information Security Management Practice Exam - 706 Verified Questions

Page 1


Information Security Management Practice Exam

Course Introduction

Information Security Management explores the principles, policies, and practices necessary to protect information assets in modern organizations. The course examines key concepts such as risk assessment, security frameworks, governance models, and compliance requirements. Students will learn about the development and implementation of security policies, incident response planning, and strategies for managing cybersecurity threats. Emphasis is placed on balancing organizational goals with legal, ethical, and technical considerations to establish a robust security posture. Through case studies and practical applications, students gain the skills needed to design, evaluate, and manage effective information security programs.

Recommended Textbook Management of Information Security 5th Edition by Michael

Available Study Resources on Quizplus

12 Chapters

706 Verified Questions

706 Flashcards

Source URL: https://quizplus.com/study-set/2555

Page 2

Chapter 1: Introduction to the Management of Information Security

Available Study Resources on Quizplus for this Chatper

63 Verified Questions

63 Flashcards

Source URL: https://quizplus.com/quiz/50835

Sample Questions

Q1) Human error or failure often can be prevented with training,ongoing awareness activities, and ____________________.

A) threats

B) education

C) hugs

D) paperwork

Answer: B

Q2) A(n)____________________ is a potential weakness in an asset or its defensive control(s).

Answer: vulnerability

Q3) Explain the differences between a leader and a manager.

Answer: The distinctions between a leader and a manager arise in the execution of organizational tasks.A leader provides purpose,direction,and motivation to those that follow.By comparison,a manager administers the resources of the organization.He or she creates budgets,authorizes expenditures,and hires employees.

Q4) A(n)____________________ hacks the public telephone network to make free calls or disrupt services.

Answer: phreaker

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Compliance: Law and Ethics

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/50836

Sample Questions

Q1) an approach that applies moral codes to actions drawn from realistic situations

A)criminal law

B)public law

C)ethics

D)Computer Security Act (CSA)

E)Electronic Communications Privacy Act

F)Cybersecurity Act

G) normative ethics

H) applied ethics

Answer: H

Q2) Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information,as well as policies and procedures to maintain them?

A) ECPA

B) Sarbanes-Oxley

C) HIPAA

D) Gramm-Leach-Bliley

Answer: C

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Governance and Strategic Planning for Security

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/50837

Sample Questions

Q1) The National Association of Corporate Directors (NACD)recommends four essential practices for boards of directors.Which of the following is NOT one of these recommended practices?

A) Hold regular meetings with the CIO to discuss tactical InfoSec planning

B) Assign InfoSec to a key committee and ensure adequate support for that committee

C) Ensure the effectiveness of the corporation's InfoSec policy through review and approval

D) Identify InfoSec leaders, hold them accountable, and ensure support for them

Answer: A

Q2) Which type of planning is used to organize the ongoing,day-to-day performance of tasks?

A) Strategic

B) Tactical

C) Organizational

D) Operational

Answer: D

Q3) The ______________________ phase is the last phase of SecSDLC,but perhaps the most important.

Answer: maintenance and change

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Information Security Policy

Available Study Resources on Quizplus for this Chatper

56 Verified Questions

56 Flashcards

Source URL: https://quizplus.com/quiz/50838

Sample Questions

Q1) Information security policies are designed to provide structure in the workplace and explain the will of the organization's management.

A)True

B)False

Q2) In the bull's-eye model,the ____________________ layer is the place where threats from public networks meet the organization's networking infrastructure.

Q3) The 'Authorized Uses' section of an ISSP specifies what the identified technology cannot be used for.

A)True

B)False

Q4) In which phase of the SecSDLC must the team create a plan to distribute and verify the distribution of the policies?

A) design

B) implementation

C) investigation

D) analysis

Q5) List the major components of the ISSP.

Q6) How should a policy administrator facilitate policy reviews?

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Developing the Security Program

Available Study Resources on Quizplus for this Chatper

65 Verified Questions

65 Flashcards

Source URL: https://quizplus.com/quiz/50839

Sample Questions

Q1) A task or subtask becomes a(n)action step when it can be completed by one individual or skill set and when it includes a single deliverable.

A)True

B)False

Q2) What is the security education,training,and awareness program? Describe how the program aims to enhance security.

Q3) An organization's information security program refers to the entire set of activities,resources,personnel,and technologies used by an organization to manage the risks to the information  _______ of the organization.

Q4) What is the Chief Information Security Office primarily responsible for?

Q5) Which of the following is true about the security staffing,budget,and needs of a medium-sized organization?

A) they have a larger security staff than a small organization

B) they have a larger security budget (as percent of IT budget) than a small organization

C) they have a smaller security budget (as percent of IT budget) than a large organization

D) they have larger information security needs than a small organization

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Risk Management: Identifying and Assessing Risk

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50840

Sample Questions

Q1) List the stages in the risk identification process in order of occurrence.

Q2) What are the included tasks in the identification of risks?

Q3) What should you be armed with to adequately assess potential weaknesses in each information asset?

A) Properly classified inventory

B) Audited accounting spreadsheet

C) Intellectual property assessment

D) List of known threats

Q4) An estimate made by the manager using good judgement and experience can account for which factor of risk assessment?

A) Risk determination

B) Assessing potential loss

C) Likelihood and consequences

D) Uncertainty

Q5) MAC addresses are considered a reliable identifier for devices with network interfaces,since they are essentially foolproof.

A)True

B)False

Q6) For the purposes of relative risk assessment how is risk calculated?

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Risk Management: Controlling Risk

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50841

Sample Questions

Q1) Which of the following is NOT an alternative to using CBA to justify risk controls?

A) benchmarking

B) due care and due diligence

C) selective risk avoidance

D) the gold standard

Q2) What is the result of subtracting the post-control annualized loss expectancy and the ACS from the pre-control annualized loss expectancy?

A) cost-benefit analysis

B) exposure factor

C) single loss expectancy

D) annualized rate of occurrence

Q3) What are the four phases of the Microsoft risk management strategy?

Q4) The ____________________ risk control strategy attempts to shift the risk to other assets,  processes,or organizations.

Q5) The criterion most commonly used when evaluating a strategy to implement InfoSec controls and safeguards is economic feasibility.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Security Management Models

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50842

Sample Questions

Q1) Separation of duties is the principle by which members of the organization can access the minimum amount of information for the minimum amount of time necessary to perform their required duties.

A)True

B)False

Q2) The principle of limiting users' access privileges to the specific information required to perform their assigned tasks is known as need-to-know.

A)True

B)False

Q3) The data access principle that ensures no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary is known as minimal privilege.

A)True

B)False

Q4) According to COSO,internal control is a process designed to provide reasonable assurance regarding the achievement of objectives in what three categories?

Q5) Access controls are build on three key principles. List and briefly define them.

Q6) Under what circumstances should access controls be centralized vs.decentralized?

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Security Management Practices

Available Study Resources on Quizplus for this Chatper

59 Verified Questions

59 Flashcards

Source URL: https://quizplus.com/quiz/50843

Sample Questions

Q1) Organizations must consider all but which of the following during development and implementation of an InfoSec measurement program?

A) Measurements must yield quantifiable information

B) Data that supports the measures needs to be readily obtainable

C) Only repeatable InfoSec processes should be considered for measurement

D) Measurements must be useful for tracking non-compliance by internal personnel

Q2) Which of the following is NOT a question a CISO should be prepared to answer,about a performance measures program,according to Kovacich?

A) Why should these measurements be collected?

B) Where will these measurements be collected?

C) What affect will measurement collection have on efficiency?

D) Who will collect these measurements?

Q3) The last phase in the NIST performance measures implementation process is to apply ______________ actions which closes the gap found in Phase 2.

Q4) Performance measurements are seldom required in today's regulated InfoSec environment.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Planning for Contingencies

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50844

Sample Questions

Q1) ____________________ planning ensures that critical business functions can continue if a disaster occurs.

Q2) In which contingency plan testing strategy do individuals participate in a role-playing exercise in which the CP team is presented with a scenario of an actual incident or disaster and expected to react as if it had occurred?

A) Desk check

B) Simulation

C) Structured walk-through

D) Parallel testing

Q3) In digital forensics,all investigations follow the same basic methodology.Which of the following should be performed first in a digital forensics investigation?

A) Report the findings to the proper authority

B) Acquire (seize) the evidence without alteration or damage

C) Identify relevant items of evidentiary value (EM)

D) Analyze the data without risking modification or unauthorized access

Q4) Discuss three of the five strategies that can be used to test contingency strategies.

Q5) When undertaking the BIA,what should the organization consider?

To view all questions and flashcards with answers, click on the resource link above.

Page 12

Chapter 11: Personnel and Security

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50845

Sample Questions

Q1) provide the policies,guidelines,and standards,performing conulting and risk assessment and develop technical architectures

A) Definers

B) Builders

C) security manager

D) security technician

E) systems programmer

F) ethics officer

G) CISSP

H) SSCP

I) SANS

J) CCE

Q2) List the six key principles that should shape the career of a CISO.

Q3) Ultimately,the _______________________ is the spokesperson for the security team and is responsible for the overall InfoSec program.

Q4) What are the qualifications and position requirements of a typical security technician?

Q5) What is the Security+ certification and who is a typical candidate for this certification?

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Protection Mechanisms

Available Study Resources on Quizplus for this Chatper

61 Verified Questions

61 Flashcards

Source URL: https://quizplus.com/quiz/50846

Sample Questions

Q1) Which of the following is true about firewalls and their ability to adapt in a network?

A) Firewalls can interpret human actions and make decisions outside their programming

B) Because firewalls are not programmed like a computer, they are less error prone

C) Firewalls are flexible and can adapt to new threats

D) Firewalls deal strictly with defined patterns of measured observation

Q2) A(n)____________________ is a secret word or combination of characters known only by the user.

Q3) The "something a person has" authentication mechanism takes advantage of something inherent in the user that is evaluated using biometrics.

A)True

B)False

Q4) What is the range of the well-known ports used by TCP and UDP?

A) 1024-65,536

B) 0-1023

C) 0-65,536

D) 20, 21, 25, 53, 80

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.