SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Attributes and characteristics of the 'desired state'
Vulnerability assessment
Role-based access control
Patch management process
2. Information security governance models are highly dependent on the _____________________.
Digital certificate
Information contained on the equipment
Overall organizational structure
Digital signatures
3. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Control risk
Is willing to accept
Monitoring processes
What happened and how the breach was resolved
4. Useful but only with regard to specific technical skills.
Cracker
Countermeasure cost-benefit analysis
Proficiency testing
Performing a risk assessment
5. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Audit objectives
Penetration testing
Risk assessment - evaluation and impact analysis
Support the business objectives of the organization
6. The primary role of the information security manager in the process of information classification within the organization.
Patch management process
Decentralization
Asset classification
Defining and ratifying the classification structure of information assets
7. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
MAL wear
Return on security investment (ROSI)
Nondisclosure agreement (NDA)
What happened and how the breach was resolved
8. Programs that act without a user's knowledge and deliberately alter a computer's operations
Access control matrix
MAL wear
Personal firewall
Centralization of information security management
9. Ensure that transmitted information can be attributed to the named sender.
Access control matrix
Resource dependency assessment
The awareness and agreement of the data subjects
Digital signatures
10. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
OBusiness case development
Security risk
Background check
Cyber extortionist
11. Whenever personal data are transferred across national boundaries; ________________________ are required.
Rule-based access control
Increase business value and confidence
The awareness and agreement of the data subjects
Get senior management onboard
12. A repository of historical data organized by subject to support decision makers in the org
Background check
Breakeven point of risk reduction and cost
Access control matrix
Data warehouse
13. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
What happened and how the breach was resolved
Continuous analysis - monitoring and feedback
Increase business value and confidence
Public key infrastructure (PKI)
14. A key indicator of performance measurement.
Strategic alignment of security with business objectives
Overall organizational structure
Cyber extortionist
The information security officer
15. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Defined objectives
All personnel
Regulatory compliance
Strategic alignment of security with business objectives
16. Should be determined from the risk assessment results.
Notifications and opt-out provisions
Skills inventory
Audit objectives
Its ability to reduce or eliminate business risks
17. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Performing a risk assessment
Inherent risk
Classification of assets needs
Support the business objectives of the organization
18. Primarily reduce risk and are most effective for the protection of information assets.
Identify the relevant systems and processes
Public key infrastructure (PKI)
Trusted source
Key controls
19. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Properly aligned with business goals and objectives
Residual risk would be reduced by a greater amount
Data classification
Skills inventory
20. A function of the session keys distributed by the PKI.
Defined objectives
Confidentiality
Baseline standard and then develop additional standards
Background checks of prospective employees
21. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Alignment with business strategy
Nondisclosure agreement (NDA)
Encryption
Patch management
22. Provides strong online authentication.
Residual risk would be reduced by a greater amount
Properly aligned with business goals and objectives
Public key infrastructure (PKI)
Data mart
23. Has full responsibility over data.
Assess the risks to the business operation
Risk management and the requirements of the organization
Intrusion detection system (IDS)
The data owner
24. By definition are not previously known and therefore are undetectable.
Data isolation
Undervoltage (brownout)
The board of directors and senior management
0-day vulnerabilities
25. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Skills inventory
Worm
Do with the information it collects
SWOT analysis
26. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Risk management and the requirements of the organization
Tie security risks to key business objectives
Waterfall chart
Lack of change management
27. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Overall organizational structure
Transmit e-mail messages
Countermeasure cost-benefit analysis
Knowledge management
28. When the ________________ is more than the cost of the risk - the risk should be accepted.
Multinational organization
Regular review of access control lists
Cost of control
Role-based policy
29. Culture has a significant impact on how information security will be implemented in a ______________________.
Multinational organization
Spoofing attacks
Prioritization
Malicious software and spyware
30. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Impractical and is often cost-prohibitive
Power surge/over voltage (spike)
Annual loss expectancy (ALE)calculations
Phishing
31. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Background checks of prospective employees
Risk management and the requirements of the organization
Worm
Biometric access control systems
32. Occurs after the risk assessment process - it does not measure it.
Patch management process
Use of security metrics
Data classification
Lack of change management
33. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Deeper level of analysis
All personnel
The authentication process is broken
Support the business objectives of the organization
34. Someone who uses the internet or network to destroy or damage computers for political reasons
Confidentiality
All personnel
Patch management
Cyber terrorist
35. Utility program that detects and protects a personal computer from unauthorized intrusions
Encryption
Personal firewall
Proficiency testing
Countermeasure cost-benefit analysis
36. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Methodology used in the assessment
Spoofing attacks
The information security officer
Security code reviews for the entire software application
37. The PRIMARY goal in developing an information security strategy is to: _________________________.
Support the business objectives of the organization
A network vulnerability assessment
Applying the proper classification to the data
People
38. BEST option to improve accountability for a system administrator is to _____________________.
Regular review of access control lists
Transferred risk
include security responsibilities in a job description
Applying the proper classification to the data
39. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Penetration testing
Encryption of the hard disks
Trusted source
Alignment with business strategy
40. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Do with the information it collects
Regular review of access control lists
Two-factor authentication
Cyber extortionist
41. Occurs when the electrical supply drops
Undervoltage (brownout)
Rule-based access control
Regular review of access control lists
Malicious software and spyware
42. It is easier to manage and control a _________________.
Centralized structure
Service level agreements (SLAs)
Skills inventory
Security code reviews for the entire software application
43. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Residual risk would be reduced by a greater amount
Safeguards over keys
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Regulatory compliance
44. Provide metrics to which outsourcing firms can be held accountable.
Impractical and is often cost-prohibitive
Service level agreements (SLAs)
Confidentiality
Threat assessment
45. Should PRIMARILY be based on regulatory and legal requirements.
Retention of business records
The awareness and agreement of the data subjects
Fault-tolerant computer
Lack of change management
46. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Alignment with business strategy
include security responsibilities in a job description
Intrusion detection system (IDS)
The board of directors and senior management
47. Without _____________________ - there cannot be accountability.
Well-defined roles and responsibilities
Digital certificate
Applying the proper classification to the data
Encryption key management
48. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Hacker
Access control matrix
All personnel
Risk management and the requirements of the organization
49. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
Threat assessment
All personnel
Well-defined roles and responsibilities
Lack of change management
50. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Control effectiveness
Tailgating
People
Performing a risk assessment