SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When the ________________ is more than the cost of the risk - the risk should be accepted.
Cost of control
Well-defined roles and responsibilities
Owner of the information asset
Residual risk
2. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Control risk
Single sign-on (SSO) product
Data warehouse
Spoofing attacks
3. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Knowledge management
Decentralization
Background checks of prospective employees
Spoofing attacks
4. Used to understand the flow of one process into another.
Platform security - intrusion detection and antivirus controls
Waterfall chart
The data custodian
Process of introducing changes to systems
5. BEST option to improve accountability for a system administrator is to _____________________.
Cross-site scripting attacks
Key controls
include security responsibilities in a job description
Patch management
6. Oversees the overall classification management of the information.
Skills inventory
Data owners
The information security officer
0-day vulnerabilities
7. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Regular review of access control lists
Background check
BIA (Business Impact Assessment
Overall organizational structure
8. Focuses on identifying vulnerabilities.
Intrusion detection system (IDS)
Penetration testing
Power surge/over voltage (spike)
Access control matrix
9. A method for analyzing and reducing a relational database to its most streamlined form
Do with the information it collects
Normalization
Creation of a business continuity plan
Inherent risk
10. Identification and _______________ of business risk enables project managers to address areas with most significance.
Internal risk assessment
Prioritization
Calculating the value of the information or asset
Malicious software and spyware
11. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Its ability to reduce or eliminate business risks
Classification of assets needs
The database administrator
Encryption
12. Occurs when the electrical supply drops
Residual risk
Personal firewall
Undervoltage (brownout)
Security baselines
13. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Certificate authority (CA)
Gap analysis
Compliance with the organization's information security requirements
Cross-site scripting attacks
14. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Baseline standard and then develop additional standards
0-day vulnerabilities
Aligned with organizational goals
Asset classification
15. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Baseline standard and then develop additional standards
Deeper level of analysis
Penetration testing
Transferred risk
16. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Background checks of prospective employees
Spoofing attacks
Security awareness training for all employees
Role-based policy
17. Information security governance models are highly dependent on the _____________________.
People
Malicious software and spyware
Residual risk
Overall organizational structure
18. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Comparison of cost of achievement
Equal error rate (EER)
Notifications and opt-out provisions
Retention of business records
19. By definition are not previously known and therefore are undetectable.
Retention of business records
Breakeven point of risk reduction and cost
Normalization
0-day vulnerabilities
20. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Examples of containment defenses
Aligned with organizational goals
Defining and ratifying the classification structure of information assets
Developing an information security baseline
21. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Properly aligned with business goals and objectives
Regulatory compliance
Patch management process
Get senior management onboard
22. A function of the session keys distributed by the PKI.
Its ability to reduce or eliminate business risks
Overall organizational structure
Confidentiality
Script kiddie
23. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Background checks of prospective employees
Control risk
Assess the risks to the business operation
Skills inventory
24. Programs that act without a user's knowledge and deliberately alter a computer's operations
Cyber terrorist
MAL wear
The board of directors and senior management
Residual risk
25. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Intrusion detection system (IDS)
Proficiency testing
Is willing to accept
Multinational organization
26. Provides strong online authentication.
Public key infrastructure (PKI)
All personnel
Logon banners
Use of security metrics
27. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Detection defenses
Aligned with organizational goals
What happened and how the breach was resolved
Security baselines
28. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Transferred risk
Classification of assets needs
Continuous analysis - monitoring and feedback
Cross-site scripting attacks
29. An information security manager has to impress upon the human resources department the need for _____________________.
Tailgating
Security awareness training for all employees
Public key infrastructure (PKI)
Multinational organization
30. Useful but only with regard to specific technical skills.
Proficiency testing
Information contained on the equipment
Background check
Malicious software and spyware
31. Computer that has duplicate components so it can continue to operate when one of its main components fail
Normalization
Fault-tolerant computer
Encryption of the hard disks
IP address packet filtering
32. The primary role of the information security manager in the process of information classification within the organization.
Data classification
Worm
Risk assessment - evaluation and impact analysis
Defining and ratifying the classification structure of information assets
33. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Reduce risk to an acceptable level
Control risk
Threat assessment
Background checks of prospective employees
34. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Virus
Knowledge management
Cyber terrorist
Security baselines
36. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Properly aligned with business goals and objectives
Total cost of ownership (TCO)
Key controls
37. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Decentralization
Annually or whenever there is a significant change
Role-based access control
Single sign-on (SSO) product
38. Awareness - training and physical security defenses.
Examples of containment defenses
Biometric access control systems
Background checks of prospective employees
Script kiddie
39. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Performing a risk assessment
Gain unauthorized access to applications
Security risk
Script kiddie
40. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
The authentication process is broken
Negotiating a local version of the organization standards
Information security manager
Digital certificate
41. Ensure that transmitted information can be attributed to the named sender.
Aligned with organizational goals
Skills inventory
Confidentiality
Digital signatures
42. Only valid if assets have first been identified and appropriately valued.
Control effectiveness
Confidentiality
Do with the information it collects
Annual loss expectancy (ALE)calculations
43. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Data owners
Risk assessment - evaluation and impact analysis
Stress testing
Security code reviews for the entire software application
44. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Regulatory compliance
Defining high-level business security requirements
Key risk indicator (KRI) setup
Threat assessment
45. Utility program that detects and protects a personal computer from unauthorized intrusions
Alignment with business strategy
Assess the risks to the business operation
Personal firewall
Annually or whenever there is a significant change
46. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Encryption of the hard disks
Identify the relevant systems and processes
Knowledge management
Regulatory compliance
47. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Phishing
The information security officer
Continuous analysis - monitoring and feedback
What happened and how the breach was resolved
48. Same intent as a cracker but does not have the technical skills and knowledge
BIA (Business Impact Assessment
Risk management and the requirements of the organization
Script kiddie
Impractical and is often cost-prohibitive
49. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Gain unauthorized access to applications
Data isolation
Its ability to reduce or eliminate business risks
Calculating the value of the information or asset
50. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Penetration testing
Background checks of prospective employees
Risk assessment - evaluation and impact analysis
Logon banners
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests