Jadwal Kegiatan Pelatihan |
Tanggal posting 14-Apr-24 20:25 wib. dilihat sebanyak 2
kali
|
Jadwal Kegiatan Pelatihan Bank Soal Ujian ISACA CISM |
Rp
-Gratis-
( Contoh Soal )
|
|
Posting oleh : Hery Purnama , Whatsapp. 08122334**** |
|
|
|
Jadwal Kegiatan Pelatihan , Jakarta
|
|
|
|
|
jadwalkegiatan.com
|
|
|
|
|
|
|
Detail dan Status Jadwal Kegiatan Sampai Dengan November 2024 |
Waktu Pelaksanaan |
Contoh Soal |
Biaya |
Rp
-Gratis- |
Keterangan |
CONTOH SOAL GRATIS UJIAN CISM
1. Which of the following best describes information security governance?
⚪ Information security policies.
⚪ Information security policies along with audits of those policies.
⚫ Management’s control of information security processes.
⚪ Benchmarks of metrics as compared to similar organizations.
2. What is the best method for ensuring that an organization’s security program achieves adequate business alignment?
⚪ Find and read the organization’s articles of incorporation.
⚫ Understand the organization’s vision, mission statement, and objectives.
⚪ Study the organization’s chart of management reporting (the “org chart”).
⚪ Study the organization’s financial chart of accounts.
3. Robert has located his organization’s mission statement and a list of strategic objectives. What steps should Robert take to ensure that the information security program aligns with the business?
⚫ Discuss strategic objectives with business leaders to understand better what they want to accomplish and what steps are being taken to achieve them.
⚪ Develop a list of activities that will support the organization’s strategic objectives, and determine the cost of each.
⚪ Select those controls from the organization’s control framework that align to each objective, and then ensure that those controls are effective.
⚪ Select the policies from the organization’s information security policy that are relevant to each objective, and ensure that those policies are current.
4. Michael wants to improve the risk management process in his organization by creating guidelines that will help management understand when certain risks should be accepted and when certain risks should be mitigated. The policy that Michael needs to create is known as what?
⚪ Security policy
⚪ Control framework
⚫ Risk appetite statement
⚪ Control testing procedure
5. In a risk management process, who is the best person(s) to make a risk treatment decision?
⚪ Chief risk officer (CRO)
⚪ Chief information officer (CIO)
⚫ Process owner who is associated with the risk
⚪ Chief information security officer (CISO)
6. The ultimate responsibility for an organization’s cybersecurity program lies with whom?
⚫ The board of directors
⚪ The chief executive officer (CEO)
⚪ The chief information officer (CIO)
⚪ The chief information security officer (CISO)
7. In a U.S. public company, a CISO will generally report the state of the organization’s cybersecurity program to:
⚪ The Treadway Commission
⚪ Independent auditors
⚪ The U.S. Securities and Exchange Commission
⚫ The audit committee of the board of directors
8. A new CISO in an organization is building its cybersecurity program from the ground up. To ensure collaboration among business leaders and department heads in the organization, the CISO should form and manage which of the following?
⚪ A risk committee of the board of directors
⚫ A cybersecurity steering committee
⚪ An audit committee of the board of directors
⚪ Business-aligned security policy
9. Who is the best person or group to make cyber- risk treatment decisions?
⚪ The chief information security officer (CISO)
⚪ The audit committee of the board of directors
⚫ The cybersecurity steering committee
⚪ The chief risk officer (CRO)
10. Which is the best party to conduct access reviews?
⚪ Users’ managers
⚪ Information security manager
⚪ IT service desk
⚫ Department head
11. Which is the best party to make decisions about the purpose and function of business applications?
⚫ Business department head
⚪ IT business analyst
⚪ Application developer
⚪ End user
12. Which of the following is the best definition of custodial responsibility?
⚪ Custodian protects assets based on customer’s defined interests
⚪ Custodian protects assets based on its own defined interests
⚪ Custodian makes decisions based on its own defined interests
⚫ Custodian makes decisions based on customer’s defined interests
13. What is the primary risk of IT acting as custodian for a business owner?
⚪ IT may not have enough interest to provide quality care for business applications.
⚪ IT may not have sufficient staffing to care for business applications properly.
⚫ IT may have insufficient knowledge of business operations to make good decisions.
⚪ Business departments might not give IT sufficient access to manage applications properly.
More? Visit www.herypurnama.com |
|
|
|
Kontak Kegiatan |
Nama Kontak |
Hery Purnama |
Kontak HP / Whatsapp |
08122334****
|
Lokasi / Venue Kegiatan |
Sudirman Jakarta Pusat |
|
Jakarta, DKI jakarta |
|
|
Peta Lokasi Kontak |
|
|
Perbesar Peta !
Detail peta sesuai alamat lokasi yang tertera di iklan 'Jadwal Kegiatan Pelatihan Bank Soal Ujian ISACA CISM ' . Di-generate otomatis oleh google map Api update bulan November 2024 .
Informasi selengkapnya silahkan hubungi langsung pemilik iklan kegiatan |
|
|
|
|
|
|
|
|
|
|
|
|