Information Security Management MCQs – CISA


The key components of an information systems security policy include Management support and commitment, Access Authorization and Security Awareness.
Information Security Management MCQs | MCQs.CLUB

More MCQs
Management Information System

Computer Fundamental

Computer Science

» Emerging Technology in E-Business MCQs
» Infrastructure and Operations MCQs
» Information and Database MCQs
» System Development Lifecycle & Software Development Models MCQs
» Project Management MCQs

» The Process of Auditing Information Systems MCQs
» Governance and Management of IT MCQs
» Auditing Infrastructure and Operations MCQs
» Business Continuity and Disaster Recovery MCQs

Information Security Management MCQs

The key components of an information systems security policy include Management support and commitment, Access Authorization and Security Awareness. Here on we have written useful Multiple-Choice Questions on Information Security Management that fully cover MCQs on Cyber Security Multiple Choice Questions & Answers, Information Security Technologies Questions and Answers, Information Security mcq & quiz, Information Security Management System (ISMS) Quiz, network security quiz answers, application security mcq. These MCQs are useful for Competitive exams, Business management exams and Professional accountancy exams.

  1. To retain a competitive advantage and to meet basic business requirements organizations must:
    1. Ensure the integrity of the information stored on their computer systems
    2. Preserve the confidentiality pf sensitive data
    3. Ensure the continued availability of their information systems
    4. Ensure conformity to laws, regulations and standards
    5. All of the above
  1. The key components of an information systems security policy include:
    1. Management support and commitment
    2. Access Authorization
    3. Security Awareness
    4. All of the above
  1. A number of different mechanisms are available for raising security awareness including:
    1. Distribution of a written security policy
    2. Training on a regular basis of new employees, users
    3. Both A&B
    4. None
  1. Data classification as a control measure should define:
    1. Who has access rights
    2. Who is responsible for determining the access rights and access levels
    3. What approvals are needed for access
    4. Computer crime issues and exposures
    5. All of the above
  1. Threats to businesses include:
    1. Financial loss, Legal repercussions
    2. Loss or credibility or competitive edge
    3. Disclosure of confidential, sensitive or embarrassing information, Industrial espionage
    4. All of the above
  1. Logical access controls are one of the primary safeguards for securing software and data within an information processing facility.
    1. True
    2. False
  1. Technical exposures are the unauthorized implementation or modification of data and software at the network, platform, database or application level. They include:
    1. Data diddling involves changing data before or as they are entered into the computer.
    2. Trojan horses involve hiding malicious, fraudulent code in an authorized computer program.
    3. Wire-tapping involves eaves dropping on information being transmitted over telecommunications lines
    4. All of the above
Read more

2 Responses

Leave a Reply

Join us
Recent Post
Follow us

Sign up for Free MCQs

Welcome to the Club

Log in to continue. IT'S FREE


By continuing, you agree to MCQs CLUB’s Terms of Service and acknowledge you’ve read our Privacy Policy