1.
Which of the following is the MOST important factor when designing information security architecture?
2.
Which of the following characteristics is MOST important when looking at prospective candidates for the role of chief information security officer (CISO)?
3.
Which of the following are likely to be updated MOST frequently?
4.
Who should be responsible for enforcing access rights to application data?
5.
The chief information security officer (CISO) should ideally have a direct reporting relationship to the:
6.
Which of the following is the MOST essential task for a chief information security officer (CISO) to perform?
7.
Developing a successful business case for the acquisition of information security software products can BEST be assisted by:
8.
When an information security manager is developing a strategic plan for information security, the timeline for the plan should be:
9.
Which of the following is the MOST important information to include in a strategic plan for information security?
10.
Information security projects should be prioritized on the basis of: