Information Security Management Systems


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Which of the following is a focus for information security?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Which of the following is NOT an example of a method used in information security?

2. Which of the following is NOT an example of an information security management policy or procedure?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

These questions will help you be sure you understand how an information security management system (ISMS) works. You will be quizzed on different ways this type of system can be used and created.

Quiz & Worksheet Goals

In this assessment, you can find out if you know about:

  • The focus of information security
  • Methods used to ensure information security
  • Benefits of having an ISMS

Skills Practiced

  • Reading comprehension - ensure that you draw the most important information from the lesson, such as the methods used in information security
  • Critical thinking - apply relevant concepts to examine information about what type of ISMS works to create continuous improvement
  • Information recall - access the knowledge you've gained regarding one of the focuses of information security

Additional Learning

For more information about this type of technology, read the lesson titled Information Security Management Systems. This lesson will explore topics like:

  • Physical vs. digital security
  • Types of information that need protection
  • The importance of effective information security