SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When defining the information classification policy - the ___________________ need to be identified.
Trusted source
Requirements of the data owners
Support the business objectives of the organization
Nondisclosure agreement (NDA)
2. Has to be integrated into the requirements of every software application's design.
Encryption key management
Security baselines
Return on security investment (ROSI)
Platform security - intrusion detection and antivirus controls
3. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Well-defined roles and responsibilities
Lack of change management
Phishing
Properly aligned with business goals and objectives
4. Applications cannot access data associated with other apps
Total cost of ownership (TCO)
Cyber extortionist
Tie security risks to key business objectives
Data isolation
5. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Cyber extortionist
Key risk indicator (KRI) setup
Compliance with the organization's information security requirements
Single sign-on (SSO) product
6. provides the most effective protection of data on mobile devices.
Encryption
Gain unauthorized access to applications
Internal risk assessment
What happened and how the breach was resolved
7. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Protective switch covers
The authentication process is broken
Skills inventory
Owner of the information asset
8. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Personal firewall
Properly aligned with business goals and objectives
Transferred risk
Creation of a business continuity plan
9. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Defining and ratifying the classification structure of information assets
Encryption key management
Digital certificate
Security risk
10. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Consensus on risks and controls
Risk management and the requirements of the organization
Identify the relevant systems and processes
Asset classification
11. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Consensus on risks and controls
Certificate authority (CA)
Asset classification
Overall organizational structure
12. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Trojan horse
Tie security risks to key business objectives
Transferred risk
Two-factor authentication
13. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Data owners
Access control matrix
Nondisclosure agreement (NDA)
Vulnerability assessment
14. Uses security metrics to measure the performance of the information security program.
Identify the vulnerable systems and apply compensating controls
Inherent risk
Information security manager
Multinational organization
15. Occurs when the electrical supply drops
Undervoltage (brownout)
include security responsibilities in a job description
Detection defenses
Spoofing attacks
16. A notice that guarantees a user or a web site is legitimate
Digital certificate
Resource dependency assessment
Two-factor authentication
Penetration testing
17. Should be performed to identify the risk and determine needed controls.
Script kiddie
Internal risk assessment
Background checks of prospective employees
Countermeasure cost-benefit analysis
18. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Notifications and opt-out provisions
Residual risk would be reduced by a greater amount
Gap analysis
Service level agreements (SLAs)
19. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Conduct a risk assessment
Skills inventory
The database administrator
Consensus on risks and controls
20. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Role-based access control
Background check
Tailgating
Digital signatures
21. Used to understand the flow of one process into another.
Waterfall chart
Get senior management onboard
Defining and ratifying the classification structure of information assets
Transferred risk
22. A repository of historical data organized by subject to support decision makers in the org
Creation of a business continuity plan
Prioritization
Risk assessment - evaluation and impact analysis
Data warehouse
23. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. Programs that act without a user's knowledge and deliberately alter a computer's operations
Audit objectives
Support the business objectives of the organization
Single sign-on (SSO) product
MAL wear
25. Involves the correction of software weaknesses and would necessarily follow change management procedures.
The balanced scorecard
OBusiness case development
Impractical and is often cost-prohibitive
Patch management
26. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Certificate authority (CA)
Reduce risk to an acceptable level
Performing a risk assessment
27. ecurity design flaws require a ____________________.
Key controls
Patch management
Use of security metrics
Deeper level of analysis
28. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Script kiddie
Creation of a business continuity plan
Consensus on risks and controls
Intrusion detection system (IDS)
29. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
The board of directors and senior management
Data isolation
Monitoring processes
Well-defined roles and responsibilities
30. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Security awareness training for all employees
Creation of a business continuity plan
Nondisclosure agreement (NDA)
Notifications and opt-out provisions
31. Oversees the overall classification management of the information.
Confidentiality
The information security officer
Decentralization
Audit objectives
32. Provides strong online authentication.
Skills inventory
Worm
Public key infrastructure (PKI)
Continuous monitoring control initiatives
33. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
Negotiating a local version of the organization standards
All personnel
Cracker
Virus
34. Someone who uses the internet or network to destroy or damage computers for political reasons
Annual loss expectancy (ALE)calculations
Key controls
Cyber terrorist
A network vulnerability assessment
35. The PRIMARY goal in developing an information security strategy is to: _________________________.
include security responsibilities in a job description
Process of introducing changes to systems
Encryption key management
Support the business objectives of the organization
36. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Encryption of the hard disks
Asset classification
All personnel
Single sign-on (SSO) product
37. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Exceptions to policy
Process of introducing changes to systems
Impractical and is often cost-prohibitive
Examples of containment defenses
38. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Security baselines
Power surge/over voltage (spike)
Identify the vulnerable systems and apply compensating controls
Transmit e-mail messages
39. Inject malformed input.
Breakeven point of risk reduction and cost
Cross-site scripting attacks
Key controls
Residual risk
40. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Conduct a risk assessment
Residual risk
Assess the risks to the business operation
Power surge/over voltage (spike)
41. Reducing risk to a level too small to measure is _______________.
Undervoltage (brownout)
Impractical and is often cost-prohibitive
Centralization of information security management
Skills inventory
42. An information security manager has to impress upon the human resources department the need for _____________________.
Logon banners
Security awareness training for all employees
Transferred risk
Assess the risks to the business operation
43. New security ulnerabilities should be managed through a ________________.
Data isolation
Inherent risk
Patch management process
Get senior management onboard
44. A risk assessment should be conducted _________________.
Platform security - intrusion detection and antivirus controls
Annually or whenever there is a significant change
Decentralization
Transferred risk
45. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Examples of containment defenses
Strategic alignment of security with business objectives
Impractical and is often cost-prohibitive
Risk assessment - evaluation and impact analysis
46. Most effective for evaluating the degree to which information security objectives are being met.
Inherent risk
Aligned with organizational goals
The balanced scorecard
Spoofing attacks
47. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Methodology used in the assessment
Regular review of access control lists
Gain unauthorized access to applications
Audit objectives
48. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Patch management
Safeguards over keys
Risk appetite
Rule-based access control
49. A Successful risk management should lead to a ________________.
Negotiating a local version of the organization standards
Transmit e-mail messages
Breakeven point of risk reduction and cost
Power surge/over voltage (spike)
50. The job of the information security officer on a management team is to ___________________.
Assess the risks to the business operation
Centralization of information security management
Security risk
Increase business value and confidence