Inspirational journeys

Follow the stories of academics and their research expeditions

CISM—Certified Information Security Manager - Part 34

Mary Smith

Thu, 16 Apr 2026

CISM—Certified Information Security Manager - Part 34

1. Which of the following is MOST helpful in integrating information security governance with corporate governance?

A) Assigning the implementation of information security governance to the steering committee.
B) Including information security processes within operational and management processes.
C) Providing independent reports of information security efficiency and effectiveness to the board.
D) Aligning the information security governance to a globally accepted framework.



2. Which of the following is the BEST way to align security and business strategies?

A) Include security risk as part of corporate risk management.
B) Develop a balanced scorecard for security.
C) Establish key performance indicators (KPIs) for business through security processes.
D) Integrate information security governance into corporate governance.



3. When developing an information security governance framework, which of the following should be the FIRST activity?

A) Integrate security within the system's development life-cycle process.
B) Align the information security program with the organization's other risk and control activities.
C) Develop policies and procedures to support the framework.
D) Develop response measures to detect and ensure the closure of security breaches.



4. Which of the following is the MOST effective way for senior management to support the integration of information security governance into corporate governance?

A) Develop the information security strategy based on the enterprise strategy.
B) Appoint a business manager as heard of information security.
C) Promote organization-wide information security awareness campaigns.
D) Establish a steering committee with representation from across the organization.



5. Which of the following would BEST help to ensure the alignment between information security and business functions?

A) Developing information security polices
B) Establishing an information security governance committee
C) Establishing a security awareness program
D) Providing funding for information security efforts



1. Right Answer: B
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: B
Explanation:

0 Comments

Leave a comment