SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provide metrics to which outsourcing firms can be held accountable.
Rule-based access control
Risk management and the requirements of the organization
Service level agreements (SLAs)
Biometric access control systems
2. Focuses on identifying vulnerabilities.
Certificate authority (CA)
Developing an information security baseline
Penetration testing
Information security manager
3. The best measure for preventing the unauthorized disclosure of confidential information.
Acceptable use policies
Prioritization
Role-based access control
Key risk indicator (KRI) setup
4. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Cyber extortionist
Intrusion detection system (IDS)
Inherent risk
Security awareness training for all employees
5. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Risk appetite
Control risk
Applying the proper classification to the data
Its ability to reduce or eliminate business risks
6. A risk assessment should be conducted _________________.
Deeper level of analysis
Annually or whenever there is a significant change
Regular review of access control lists
Inherent risk
7. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Get senior management onboard
Data mart
Calculating the value of the information or asset
Risk assessment - evaluation and impact analysis
8. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Security code reviews for the entire software application
Attributes and characteristics of the 'desired state'
The information security officer
Data isolation
9. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Breakeven point of risk reduction and cost
Control risk
The authentication process is broken
Retention of business records
10. BEST option to improve accountability for a system administrator is to _____________________.
Support the business objectives of the organization
Virus
Spoofing attacks
include security responsibilities in a job description
11. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Virus detection
Transferred risk
Continuous monitoring control initiatives
Logon banners
12. Reducing risk to a level too small to measure is _______________.
The data custodian
Centralized structure
Cost of control
Impractical and is often cost-prohibitive
13. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Retention of business records
Baseline standard and then develop additional standards
Multinational organization
Methodology used in the assessment
14. Computer that has duplicate components so it can continue to operate when one of its main components fail
Fault-tolerant computer
Centralization of information security management
Impractical and is often cost-prohibitive
Data warehouse
15. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Continuous analysis - monitoring and feedback
Phishing
Consensus on risks and controls
Get senior management onboard
16. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
0-day vulnerabilities
Digital certificate
Return on security investment (ROSI)
Knowledge management
17. In order to highlight to management the importance of network security - the security manager should FIRST _______________.
Background check
Gap analysis
Platform security - intrusion detection and antivirus controls
Conduct a risk assessment
18. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Countermeasure cost-benefit analysis
The data owner
Virus
Cyber terrorist
19. Risk should be reduced to a level that an organization _____________.
Is willing to accept
Reduce risk to an acceptable level
Performing a risk assessment
Nondisclosure agreement (NDA)
20. A method for analyzing and reducing a relational database to its most streamlined form
Deeper level of analysis
Cross-site scripting attacks
Confidentiality
Normalization
21. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
The board of directors and senior management
Regulatory compliance
Regular review of access control lists
Role-based policy
22. Uses security metrics to measure the performance of the information security program.
Information security manager
BIA (Business Impact Assessment
Protective switch covers
Data warehouse
23. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Process of introducing changes to systems
Resource dependency assessment
Key risk indicator (KRI) setup
The database administrator
24. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Two-factor authentication
Trojan horse
Defining high-level business security requirements
Logon banners
25. Someone who uses the internet or network to destroy or damage computers for political reasons
Comparison of cost of achievement
Retention of business records
Penetration testing
Cyber terrorist
26. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Performing a risk assessment
Transferred risk
Alignment with business strategy
Data isolation
27. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Tailgating
Confidentiality
Exceptions to policy
Encryption key management
28. Has to be integrated into the requirements of every software application's design.
Prioritization
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Cross-site scripting attacks
Encryption key management
29. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Properly aligned with business goals and objectives
Internal risk assessment
Prioritization
The authentication process is broken
30. Should be a standard requirement for the service provider.
Background check
Cracker
Its ability to reduce or eliminate business risks
0-day vulnerabilities
31. Cannot be minimized
Background checks of prospective employees
Inherent risk
0-day vulnerabilities
Trojan horse
32. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Equal error rate (EER)
Use of security metrics
Two-factor authentication
Platform security - intrusion detection and antivirus controls
33. ecurity design flaws require a ____________________.
Deeper level of analysis
Regular review of access control lists
Annually or whenever there is a significant change
Identify the vulnerable systems and apply compensating controls
34. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
The board of directors and senior management
Defined objectives
Vulnerability assessment
Performing a risk assessment
35. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Annual loss expectancy (ALE)calculations
Strategic alignment of security with business objectives
Multinational organization
Key risk indicator (KRI) setup
36. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Phishing
Encryption of the hard disks
Total cost of ownership (TCO)
Reduce risk to an acceptable level
37. Should be determined from the risk assessment results.
Rule-based access control
Audit objectives
Assess the risks to the business operation
Cyber extortionist
38. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Exceptions to policy
Certificate authority (CA)
BIA (Business Impact Assessment
Access control matrix
39. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Cyber extortionist
Key risk indicator (KRI) setup
Virus detection
Biometric access control systems
40. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Transmit e-mail messages
Waterfall chart
Detection defenses
A network vulnerability assessment
41. A notice that guarantees a user or a web site is legitimate
Annual loss expectancy (ALE)calculations
Digital certificate
Patch management process
Reduce risk to an acceptable level
42. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Negotiating a local version of the organization standards
Public key infrastructure (PKI)
Developing an information security baseline
Decentralization
43. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Key risk indicator (KRI) setup
Regulatory compliance
Gap analysis
Knowledge management
44. Inject malformed input.
Increase business value and confidence
Regulatory compliance
Platform security - intrusion detection and antivirus controls
Cross-site scripting attacks
45. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Gain unauthorized access to applications
Malicious software and spyware
Use of security metrics
Control risk
46. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Phishing
Patch management process
Undervoltage (brownout)
Calculating the value of the information or asset
47. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Background check
Defining and ratifying the classification structure of information assets
Identify the vulnerable systems and apply compensating controls
Centralized structure
48. Oversees the overall classification management of the information.
The information security officer
Audit objectives
Breakeven point of risk reduction and cost
Defining high-level business security requirements
49. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Owner of the information asset
Assess the risks to the business operation
Notifications and opt-out provisions
Aligned with organizational goals
50. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
include security responsibilities in a job description
Two-factor authentication
Data mart
Alignment with business strategy
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests