Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz CISM

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz CISM

Quiz CISM, Certified Information Security Manager

The BEST strategy for risk management is to:

Which of the following would be the MOST important factor to be considered in the loss of mobile equipment with unencrypted data?

What should the information security manager do FIRST?

Which of the following would be MOST relevant to include in a cost-benefit analysis of a two-factor authentication system?

One way to determine control effectiveness is by determining:

What does a network vulnerability assessment intend to identify?

Who is responsible for ensuring that information is classified?

The information security manager should recommend to business management that the risk be:

what should be reported FIRST to senior management?

The PRIMARY reason for initiating a policy exception process is when:

Posts navigation

Previous 1 … 103 104 105 … 146 Next
Equizzing
    Privacy Policy

© 2025 Equizzing