CISM Information Security Program Development Practice Exam
Eksempel på spørsmål
Q) security training, is likely to lead to any of the following?
en) Reduced incidents of penetration
b) Increased reported cases
c) Reducing the Political Security changes
d) Increasing the access violation
Q) information classification system should:
en) consider the potential consequences of a security breach.
b) classifying personal information in electronic form.
c) by Information Manager.
d) classification system in accordance with the processed data.
Q) Which of the following is the best way to provide a new user with the original password to access the e-mail system?
en) INTER system creates a complex password with the start of 30 dager
b) Give the password for dummy phone kit for immediate expiration
c) It does not require a password, but force the user to install their own within 10 dager
d) Set an initial password equal to the user ID of the end of the 30 dager
Q) Information security should be supported:
en) management infrastructure.
b) business audit section.
c) The main owners of business processes
d) information management.