SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Transmit e-mail messages
Gain unauthorized access to applications
Control risk
Skills inventory
2. S small warehouse - designed for the end-user needs in a strategic business unit
Background check
Patch management
Data mart
Residual risk
3. The information security manager needs to prioritize the controls based on ________________________.
Examples of containment defenses
Risk management and the requirements of the organization
Acceptable use policies
Creation of a business continuity plan
4. Program that hides within or looks like a legit program
Trojan horse
Hacker
Decentralization
Continuous analysis - monitoring and feedback
5. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Cyber extortionist
Internal risk assessment
Return on security investment (ROSI)
Risk appetite
6. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Biometric access control systems
Script kiddie
Applying the proper classification to the data
Requirements of the data owners
7. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
IP address packet filtering
Is willing to accept
Cyber extortionist
Certificate authority (CA)
8. A function of the session keys distributed by the PKI.
Key risk indicator (KRI) setup
Confidentiality
Defined objectives
Logon banners
9. Has to be integrated into the requirements of every software application's design.
IP address packet filtering
Encryption key management
Identify the vulnerable systems and apply compensating controls
Control risk
10. The primary role of the information security manager in the process of information classification within the organization.
Well-defined roles and responsibilities
Inherent risk
Defining and ratifying the classification structure of information assets
Residual risk
11. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Centralized structure
Service level agreements (SLAs)
Calculating the value of the information or asset
Well-defined roles and responsibilities
12. Involves the correction of software weaknesses and would necessarily follow change management procedures.
IP address packet filtering
Monitoring processes
Personal firewall
Patch management
13. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
Regular review of access control lists
People
Script kiddie
SWOT analysis
14. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Conduct a risk assessment
Lack of change management
Gap analysis
Nondisclosure agreement (NDA)
15. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Baseline standard and then develop additional standards
The board of directors and senior management
Classification of assets needs
Audit objectives
16. Someone who uses the internet or network to destroy or damage computers for political reasons
Digital signatures
Digital certificate
Cyber terrorist
The database administrator
17. Would protect against spoofing an internal address but would not provide strong authentication.
Asset classification
include security responsibilities in a job description
IP address packet filtering
The database administrator
18. An information security manager has to impress upon the human resources department the need for _____________________.
Negotiating a local version of the organization standards
Stress testing
Security awareness training for all employees
Logon banners
19. When the ________________ is more than the cost of the risk - the risk should be accepted.
Exceptions to policy
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Cost of control
Logon banners
20. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Data classification
Continuous monitoring control initiatives
Retention of business records
Data owners
21. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Attributes and characteristics of the 'desired state'
0-day vulnerabilities
Consensus on risks and controls
Regulatory compliance
22. A Successful risk management should lead to a ________________.
Detection defenses
Breakeven point of risk reduction and cost
Methodology used in the assessment
Continuous monitoring control initiatives
23. Focuses on identifying vulnerabilities.
Control effectiveness
Detection defenses
Penetration testing
Cyber terrorist
24. Used to understand the flow of one process into another.
Waterfall chart
Monitoring processes
Developing an information security baseline
Vulnerability assessment
25. Carries out the technical administration.
The authentication process is broken
Trojan horse
The database administrator
Tailgating
26. A method for analyzing and reducing a relational database to its most streamlined form
Normalization
Negotiating a local version of the organization standards
Requirements of the data owners
Malicious software and spyware
27. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Its ability to reduce or eliminate business risks
SWOT analysis
Owner of the information asset
Fault-tolerant computer
28. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Countermeasure cost-benefit analysis
Knowledge management
OBusiness case development
Encryption
29. Ensures that there are no scalability problems.
Stress testing
Continuous analysis - monitoring and feedback
Notifications and opt-out provisions
Defining high-level business security requirements
30. Programs that act without a user's knowledge and deliberately alter a computer's operations
Centralized structure
Personal firewall
Classification of assets needs
MAL wear
31. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Two-factor authentication
Logon banners
Detection defenses
Gain unauthorized access to applications
32. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Spoofing attacks
Asset classification
Rule-based access control
The authentication process is broken
33. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
BIA (Business Impact Assessment
Encryption key management
The board of directors and senior management
Role-based policy
34. It is easier to manage and control a _________________.
Normalization
Equal error rate (EER)
Centralized structure
Lack of change management
35. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Annually or whenever there is a significant change
Examples of containment defenses
Asset classification
36. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Fault-tolerant computer
Transferred risk
Identify the vulnerable systems and apply compensating controls
Reduce risk to an acceptable level
38. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Monitoring processes
Gap analysis
Creation of a business continuity plan
Notifications and opt-out provisions
39. A repository of historical data organized by subject to support decision makers in the org
Key risk indicator (KRI) setup
Trusted source
Certificate authority (CA)
Data warehouse
40. Occurs when the electrical supply drops
Script kiddie
Defined objectives
Process of introducing changes to systems
Undervoltage (brownout)
41. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Data owners
Control effectiveness
Get senior management onboard
Encryption key management
42. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Impractical and is often cost-prohibitive
Encryption key management
Defining high-level business security requirements
Control risk
43. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Baseline standard and then develop additional standards
Acceptable use policies
Public key infrastructure (PKI)
Residual risk
44. Provides strong online authentication.
Resource dependency assessment
Public key infrastructure (PKI)
Key controls
Encryption key management
45. By definition are not previously known and therefore are undetectable.
0-day vulnerabilities
Gain unauthorized access to applications
OBusiness case development
Compliance with the organization's information security requirements
46. Computer that has duplicate components so it can continue to operate when one of its main components fail
Defining and ratifying the classification structure of information assets
Digital certificate
Methodology used in the assessment
Fault-tolerant computer
47. Risk should be reduced to a level that an organization _____________.
Risk assessment - evaluation and impact analysis
Do with the information it collects
Is willing to accept
Comparison of cost of achievement
48. Normally addressed through antivirus and antispyware policies.
Equal error rate (EER)
Control risk
Malicious software and spyware
Key controls
49. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
The balanced scorecard
Logon banners
Data owners
Background checks of prospective employees
50. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Detection defenses
Owner of the information asset
Risk assessment - evaluation and impact analysis
The board of directors and senior management
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests