SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A function of the session keys distributed by the PKI.
Encryption of the hard disks
Confidentiality
Assess the risks to the business operation
Spoofing attacks
2. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Exceptions to policy
Gain unauthorized access to applications
Script kiddie
Cyber terrorist
3. Without _____________________ - there cannot be accountability.
Decentralization
Knowledge management
Background checks of prospective employees
Well-defined roles and responsibilities
4. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Biometric access control systems
Background checks of prospective employees
Residual risk
Security awareness training for all employees
5. Utility program that detects and protects a personal computer from unauthorized intrusions
Single sign-on (SSO) product
Tailgating
The balanced scorecard
Personal firewall
6. Awareness - training and physical security defenses.
Digital certificate
Examples of containment defenses
Key risk indicator (KRI) setup
Safeguards over keys
7. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Worm
Safeguards over keys
Fault-tolerant computer
Return on security investment (ROSI)
8. Reducing risk to a level too small to measure is _______________.
Impractical and is often cost-prohibitive
Access control matrix
Residual risk would be reduced by a greater amount
Resource dependency assessment
9. By definition are not previously known and therefore are undetectable.
0-day vulnerabilities
Proficiency testing
Examples of containment defenses
Risk assessment - evaluation and impact analysis
10. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
OBusiness case development
Continuous analysis - monitoring and feedback
Classification of assets needs
Identify the vulnerable systems and apply compensating controls
11. Used to understand the flow of one process into another.
Defined objectives
Risk management and the requirements of the organization
Security risk
Waterfall chart
12. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Assess the risks to the business operation
Certificate authority (CA)
Support the business objectives of the organization
Residual risk would be reduced by a greater amount
13. The information security manager needs to prioritize the controls based on ________________________.
Encryption
Knowledge management
Risk management and the requirements of the organization
Is willing to accept
14. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Intrusion detection system (IDS)
Trusted source
Transmit e-mail messages
Proficiency testing
15. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Spoofing attacks
Information contained on the equipment
Virus
Decentralization
16. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
Safeguards over keys
Platform security - intrusion detection and antivirus controls
Nondisclosure agreement (NDA)
OBusiness case development
17. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Security risk
Deeper level of analysis
Key risk indicator (KRI) setup
Knowledge management
18. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Its ability to reduce or eliminate business risks
Examples of containment defenses
Phishing
Certificate authority (CA)
19. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Is willing to accept
Nondisclosure agreement (NDA)
Gap analysis
Its ability to reduce or eliminate business risks
20. The most important characteristic of good security policies is that they be ____________________.
Developing an information security baseline
Aligned with organizational goals
Prioritization
0-day vulnerabilities
21. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Gap analysis
Biometric access control systems
Digital certificate
0-day vulnerabilities
22. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Exceptions to policy
Security risk
The information security officer
The board of directors and senior management
23. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Control effectiveness
Properly aligned with business goals and objectives
Waterfall chart
24. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Background checks of prospective employees
Defining high-level business security requirements
Security baselines
Deeper level of analysis
25. Information security governance models are highly dependent on the _____________________.
Overall organizational structure
Audit objectives
MAL wear
Information security manager
26. Most effective for evaluating the degree to which information security objectives are being met.
Personal firewall
The balanced scorecard
Detection defenses
Attributes and characteristics of the 'desired state'
27. Occurs when the electrical supply drops
Digital signatures
Annual loss expectancy (ALE)calculations
Undervoltage (brownout)
Fault-tolerant computer
28. Programs that act without a user's knowledge and deliberately alter a computer's operations
Breakeven point of risk reduction and cost
Support the business objectives of the organization
Encryption of the hard disks
MAL wear
29. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Phishing
Threat assessment
Process of introducing changes to systems
Cost of control
30. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Decentralization
Proficiency testing
Security baselines
Requirements of the data owners
31. Has full responsibility over data.
The data owner
Defined objectives
Strategic alignment of security with business objectives
Vulnerability assessment
32. A method for analyzing and reducing a relational database to its most streamlined form
Requirements of the data owners
Normalization
Tie security risks to key business objectives
Applying the proper classification to the data
33. The best measure for preventing the unauthorized disclosure of confidential information.
Key risk indicator (KRI) setup
Acceptable use policies
Overall organizational structure
Information security manager
34. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Return on security investment (ROSI)
Creation of a business continuity plan
Access control matrix
Biometric access control systems
35. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Skills inventory
Data classification
Continuous analysis - monitoring and feedback
Baseline standard and then develop additional standards
36. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Equal error rate (EER)
Conduct a risk assessment
Background checks of prospective employees
Owner of the information asset
37. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
include security responsibilities in a job description
Vulnerability assessment
Properly aligned with business goals and objectives
Regulatory compliance
38. Occurs after the risk assessment process - it does not measure it.
Inherent risk
Logon banners
Use of security metrics
Do with the information it collects
39. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Lack of change management
Compliance with the organization's information security requirements
Vulnerability assessment
Safeguards over keys
40. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Protective switch covers
Resource dependency assessment
Normalization
Risk appetite
41. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Lack of change management
Transmit e-mail messages
Total cost of ownership (TCO)
Spoofing attacks
42. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Assess the risks to the business operation
Risk management and the requirements of the organization
Audit objectives
Do with the information it collects
43. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Gain unauthorized access to applications
Penetration testing
Role-based policy
Process of introducing changes to systems
44. ecurity design flaws require a ____________________.
Centralized structure
Deeper level of analysis
Exceptions to policy
Creation of a business continuity plan
45. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Consensus on risks and controls
Normalization
Breakeven point of risk reduction and cost
People
46. Responsible for securing the information.
Countermeasure cost-benefit analysis
The data custodian
Security baselines
Knowledge management
47. Someone who uses the internet or network to destroy or damage computers for political reasons
Aligned with organizational goals
Cyber terrorist
Assess the risks to the business operation
Risk management and the requirements of the organization
48. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
A network vulnerability assessment
Calculating the value of the information or asset
Alignment with business strategy
Security awareness training for all employees
49. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Certificate authority (CA)
Patch management
Gain unauthorized access to applications
Strategic alignment of security with business objectives
50. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests