Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz CISM

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz CISM

Quiz CISM, Certified Information Security Manager

The PRIMARY reason for involving information security at each stage in the systems development life cycle (SDLC)…

The implementation of continuous monitoring controls is the BEST option where:

Which of the following would an information security manager BEST test for the existence of back doors?

An information security manager reviewing firewall rules will be MOST concerned if the firewall allows:

What is the MOS T cost-effective means of improving security awareness of staff personnel?

Which of the following is the MOST effective at preventing an unauthorized individual from following an authorized person through a secured entrance (tailgating or piggybacking)?

Data owners will determine what access and authorizations users will have by:

Which of the following is the MOST likely outcome of a well-designed information security awareness course?

Which item would be the BEST to include in the information security awareness training program for new general staff employees?

A critical component of a continuous improvement program for information security is:

Posts navigation

Previous 1 … 130 131 132 … 146 Next
Equizzing
    Privacy Policy

© 2025 Equizzing