Balance sheet
This document shows changes in the interest of the company’s shareholders over time.
Balance sheet
Cash flow statements
Statement of shareholders’ equity
Income statement
2) This financial statement is broken into 3 sections consisting of operating activities, investing activities, financial activities.
Cash flow statement
Balance sheet
Income statement
Statement of shareholders’ equity
3) Significant changes or upgrades in IS Program framework or architecture is an example of:
Medium term goals
Short term goal
None 1of the listed choices are correct
Long term goals
4) Of the three roles that CISOs must understand and interact with to build support for their information security program, which has the highest level of input?
Stakeholders
Influencers
Sponsors
User
5) When developing an information security program, a ______ is anyone who has an interest in the outcome of the information security program.
Stakeholders
Influencers
User
Sponsors
6) In contract negotiation, the agreement about which party assumes responsibility for the security incidents and penalties related to such an event is known as:
Performance management
Audit
Indemnity
Security
7) When developing and information program a _______ is someone who can essentially make or break the program, they benefit directly and typical authorize or fund the program.
Influencer
Sponsor
User
Stakeholder
8)This is the process where an organization issues attender or bid to anyone to purchase a product or service.
Bid requirements
Informal bidding
Procurement authority
Formal bidding
9) A cybersecurity architecture uses views or layers of the whole design o represent areas of the design specific to certain stakeholders. Which view answers the question “why are we doing this?”
Technical view
Implementation view
Business view
Functional view
10) Improvements in policies, procedures or processes that can resolve gaps in control strategies is an example of:
Long term goals
Medium term goals
None of the listed choices are correct
Short term goals
11) To be a successful CISO within an organization and work with senior management you must have considerable understanding in informal security and ______?
People skills
Financial management
Accounting
Operations management
12) A scorecard is part of an information security strategic plan. It is divided into the following areas:
Key risk indicator (KRIs)
Financial accounting of the IS program’s budget
Key performance indicators
All listed choices are correct.
13) When determining the total cost of a contract a CISO must take into account the cost of the contract and _____
In house resources used
None of the listed choices are correct
Travel expenses
Financial cost
14) How would vendor financing be accounted for in the information security budget?
OpEx
Liability
CapEx
Asset
15) When managing a budget what must a CISO be cognizant of in case the budget is cut?
OpEx
Discretionary spending
CapEx
Revenue
16) What is the purpose of contract administration?
To ensure those with signature approval are involved
To ensure effective delivery and adherence to contractual terms
To get the best possible pricing
To ensure the contact meets your requirements.
17) Which financial statement would include the value of patents and trademarks?
Statements of shareholders’ equity
Balance Sheet
Cash flow statement
Income statement
18)Which financial statement would tell you how much money a company received from selling additional units of its own stock?
Balance sheet
Income statement
Statements of shareholders’ equity
Cash flow statement
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
