GOVERNANCE - Compiled notes - Exam practise flash
40 important questions on GOVERNANCE - Compiled notes - Exam practise flash
Which interconnection connects the people and organization design and strategy elements in the business model for information security (BMIS)
Which role should review and provide input to security strategy and requirements for effective business support
Which role identifies emerging risks and identifies compliance issues
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
Which interconnection connects the Process and Technology elements in the business model for information security (BMIS)
Which role monitors regulatory compliance
Which component in GRC is the process that records and monitors the policies, procedures and controls needed to ensure that policies and standards are followed
Which main personnel participants should begin the process of the information security strategy development
Senior management, steering committee and CISO or information security manager
Which role establishes the acceptable risk and tolerances
From which document is the business case usually derived
Which role should institute processes to integrate security with business objectives
To which group should the information security manager present an overall strategy for information security to obtain approval
What are the 4 components of the GRC capability Model
Learn
Align
Perform
Review
Which roles are responsible for due care and managing risk
What is the purpose of a RACI chart
Which interconnection connects People and Process in BMIS
Which interconnection connects People and Technology in BMIS
What is the difference between a role and a responsibilty
A role is a designation assigned by virtue of job function
Responsibility is a is a description of some function related to a role
Which role should demonstrate alignment of security and business objectives
Which role ensures that risk and business impact assessments are conducted
What is meant by acceptable risk or risk appetite
Which term is used for the protection measures that directly reduce a vulnerability or threat
What are the four elements of the business model for information security
Organization design and strategy
People
Process
Technology
What are the 5 elements of COBIT 5
- Meeting stakeholder needs
- Covering the enterprise end-to-end
- Applying a single, integrated framework
- Enabling a holistic approach
- Separating governance from management
What is the purpose of a business case
Which role should evaluate and report on the degree of alignment
According to ISACA, what are the basic six outcomes of a security program that is developed from information security governance
Strategic Alignment
Risk Management
Value delivery
Resource Optimization
Performance measurement
What is the first step in establishing information security governance
Which component in GRC is the responsibly of senior management and the board of directors, and focuses on creating mechanisms to ensure that personnel follow established processes and policies?
What is the best way to convince senior management to do more than just comply with regulations?
Which enterprise architectural framework enables communication of information to personnel in a manner that is most useful to each group's responsibilities?
Which outcome of security governance ensures that the information security initiative supports organizational objectives?
What is the biggest challenge for a CISO when doing a security assessment to determine state of security program in a company
Who are responsible for having proper security controls in place for systems
Who are responsible for ensuring systems are included in relevant policies?
Which role is responsible for overseeing that all security project align with the information security strategy?
Steering committee
Which organizational role is responsible for protecting the data they are responsible
Where is information security governance in part derived from?
What are the initial requirements for developing a security strategy?
Fluctuating value of an asset. Where should the expenditure for security be based on?
2 Companies merge. Different retention periods. Regulation & Internal. Which retention period does need to be kept after the merger?
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding