Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz CISM

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz CISM

Quiz CISM, Certified Information Security Manager

What is the MOST appropriate change management procedure for the handling of emergency program changes?

Who is ultimately responsible for ensuring that information is categorized and that protective measures are taken?

The PRIMARY focus of the change control process is to ensure that changes are:

What is the FIRST thing the information security manager should do?

Which of the following would be the MOST efficient means to accomplish this?

Which of the following documents would be the BES T reference to determine whether access control mechanisms are appropriate for a critical application?

Which of the following is the MOST important process that an information security manager needs to negotiate with an outsource service provider?

Which resource is the MOST effective in preventing physical access tailgating/piggybacking?

In business critical applications, where shared access to elevated privileges by a small group is necessary, the BEST approach to implement adequate segregation of duties is to:

In business-critical applications, user access should be approved by the:

Posts navigation

Previous 1 … 125 126 127 … 146 Next
Equizzing
    Privacy Policy

© 2025 Equizzing