Chief Information Security Officer (Ciso) Quiz Questions

20 Questions | Total Attempts: 212

SettingsSettingsSettings
Please wait...
Chief Information Security Officer (Ciso) Quiz Questions

Security of data is one of the major things that most businesses aim to have when they carry their day-to-day business. A chief information security officer is charged with developing and implementing an information security program and ensuring protection of information technologies and assets. Take this quiz and see how qualified you are.


Questions and Answers
  • 1. 
    The general management community of interest must work with the information security professionals to integate solid information security concepts into the personnel management pratices of the organization
    • A. 

      True

    • B. 

      False

  • 2. 
    The use of standard job descriptions can increase the degree of professionalism in the information
    • A. 

      True

    • B. 

      False

  • 3. 
    The security manager position is much more general than that of CISO
    • A. 

      True

    • B. 

      False

  • 4. 
    The position of security technician can be offered as an entry level position
    • A. 

      True

    • B. 

      False

  • 5. 
    All of the existing certifications are fully understood by hiring organizations
    • A. 

      True

    • B. 

      False

  • 6. 
    The model used often by large organizations places the information security department within the ____ department
    • A. 

      Management

    • B. 

      Information technology

    • C. 

      Financial

    • D. 

      Production

  • 7. 
    The information security fucntion can be palced within the ____
    • A. 

      Insurance and risk management function

    • B. 

      Administrative services fucntion

    • C. 

      Legal department

    • D. 

      All of the above

  • 8. 
    _____ are often involved in national security and cyber-security tasks and move from those environments into the more business oriented world of information security
    • A. 

      Marketingmanagers

    • B. 

      Military personnel

    • C. 

      Business analysts

    • D. 

      Lawyers

  • 9. 
    Many information security professionals enter the field from traditional ____ assignments
    • A. 

      HR

    • B. 

      BA

    • C. 

      IT

    • D. 

      All of the above

  • 10. 
    A study of information positions, done by schwartz, erwin, weafer, and briney, found that positions can be classified into one of ____ areas
    • A. 

      Two

    • B. 

      Three

    • C. 

      Four

    • D. 

      Five

  • 11. 
    The ____ position is typically considered the top information security officer in the organization
    • A. 

      CISO

    • B. 

      CFO

    • C. 

      CTO

    • D. 

      CEO

  • 12. 
    ____ are the technically qualified individuals tasked to configure firewalls,deploy IDSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that an organization's security technology is properly implemented
    • A. 

      CSOs

    • B. 

      CISOs

    • C. 

      Security managers

    • D. 

      Security technicians

  • 13. 
    The breadth and depth covered in each of the domains makes the ____ one of the most difficult to attain certifications on the market
    • A. 

      Nsa

    • B. 

      Ciso

    • C. 

      Cissp

    • D. 

      Isep

  • 14. 
    The ____ examination is designed to provide cissps with a mechanism to demonstrate competence in the more in-depth and concentrated requirments of information security management
    • A. 

      Issmp

    • B. 

      Issap

    • C. 

      Cisspm

    • D. 

      Cissmp

  • 15. 
    ____ was designed to recognize mastery of an international standard for information security and a common body of knowledge (somtimes called the CBK)
    • A. 

      Cissp

    • B. 

      Issmp

    • C. 

      Sscp

    • D. 

      All of the above

  • 16. 
    The sscp exam consists of ____ multiple choice questions, and must be completed within three hours
    • A. 

      75

    • B. 

      100

    • C. 

      125

    • D. 

      225

  • 17. 
    System administration networking and security organization is better known as ____
    • A. 

      Sano

    • B. 

      San

    • C. 

      Sans

    • D. 

      Sanso

  • 18. 
    ____ are hired by the organization to serve in a temporary position or to supplement the existing workforce
    • A. 

      Temporary employees

    • B. 

      Consultants

    • C. 

      Contractors

    • D. 

      Self employees

  • 19. 
    ____ is a cornerstore in the protection of information assets and in the prevention of financial loss
    • A. 

      Fire protection

    • B. 

      Business separation

    • C. 

      Separation of duties

    • D. 

      Collusion

  • 20. 
    _____ is the requirement that every employee be able to perform the work of another employee
    • A. 

      Two man control

    • B. 

      Collusion

    • C. 

      Duty exchange

    • D. 

      Task rotation

Back to Top Back to top