SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses security metrics to measure the performance of the information security program.
Trusted source
Internal risk assessment
Impractical and is often cost-prohibitive
Information security manager
2. Provide metrics to which outsourcing firms can be held accountable.
Impractical and is often cost-prohibitive
Service level agreements (SLAs)
The database administrator
Personal firewall
3. Oversees the overall classification management of the information.
Defining and ratifying the classification structure of information assets
Conduct a risk assessment
Security baselines
The information security officer
4. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Reduce risk to an acceptable level
Assess the risks to the business operation
Return on security investment (ROSI)
Hacker
5. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Total cost of ownership (TCO)
Script kiddie
Data isolation
Breakeven point of risk reduction and cost
6. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Countermeasure cost-benefit analysis
Risk assessment - evaluation and impact analysis
Certificate authority (CA)
Cost of control
7. A Successful risk management should lead to a ________________.
Decentralization
Identify the vulnerable systems and apply compensating controls
Penetration testing
Breakeven point of risk reduction and cost
8. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Negotiating a local version of the organization standards
Digital certificate
Examples of containment defenses
Performing a risk assessment
9. Someone who uses the internet or network to destroy or damage computers for political reasons
Cyber terrorist
Acceptable use policies
Performing a risk assessment
Increase business value and confidence
10. The PRIMARY goal in developing an information security strategy is to: _________________________.
Support the business objectives of the organization
Process of introducing changes to systems
Control risk
Platform security - intrusion detection and antivirus controls
11. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
Defining and ratifying the classification structure of information assets
The data custodian
OBusiness case development
Gap analysis
12. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Calculating the value of the information or asset
Encryption of the hard disks
Consensus on risks and controls
Defining high-level business security requirements
13. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Gap analysis
Owner of the information asset
Control effectiveness
Get senior management onboard
14. Should PRIMARILY be based on regulatory and legal requirements.
Safeguards over keys
Deeper level of analysis
OBusiness case development
Retention of business records
15. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Examples of containment defenses
Developing an information security baseline
Annual loss expectancy (ALE)calculations
Transferred risk
16. Provides strong online authentication.
Residual risk
Internal risk assessment
Cross-site scripting attacks
Public key infrastructure (PKI)
17. Without _____________________ - there cannot be accountability.
Safeguards over keys
Performing a risk assessment
Well-defined roles and responsibilities
Security risk
18. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Role-based access control
Background check
Continuous analysis - monitoring and feedback
Skills inventory
19. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Compliance with the organization's information security requirements
Risk assessment - evaluation and impact analysis
Defining high-level business security requirements
Exceptions to policy
20. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Requirements of the data owners
Certificate authority (CA)
Continuous analysis - monitoring and feedback
Exceptions to policy
21. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Detection defenses
Information security manager
Alignment with business strategy
Aligned with organizational goals
22. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Patch management process
Negotiating a local version of the organization standards
Equal error rate (EER)
Two-factor authentication
23. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Do with the information it collects
Cost of control
Data warehouse
Use of security metrics
24. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Identify the relevant systems and processes
Cyber extortionist
The information security officer
Transmit e-mail messages
25. Has full responsibility over data.
Gain unauthorized access to applications
The data owner
Control risk
Asset classification
26. Would protect against spoofing an internal address but would not provide strong authentication.
The data custodian
Overall organizational structure
Script kiddie
IP address packet filtering
27. It is easier to manage and control a _________________.
Inherent risk
Use of security metrics
Encryption of the hard disks
Centralized structure
28. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
The board of directors and senior management
The authentication process is broken
Personal firewall
Reduce risk to an acceptable level
29. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Process of introducing changes to systems
Gain unauthorized access to applications
Risk appetite
Worm
30. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Two-factor authentication
Normalization
Data classification
Countermeasure cost-benefit analysis
31. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Control effectiveness
BIA (Business Impact Assessment
Nondisclosure agreement (NDA)
Gain unauthorized access to applications
32. The MOST important element of an information security strategy.
Defined objectives
Threat assessment
Tie security risks to key business objectives
Patch management
33. The information security manager needs to prioritize the controls based on ________________________.
Reduce risk to an acceptable level
Continuous analysis - monitoring and feedback
Vulnerability assessment
Risk management and the requirements of the organization
34. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Applying the proper classification to the data
Alignment with business strategy
Comparison of cost of achievement
Patch management
35. New security ulnerabilities should be managed through a ________________.
Impractical and is often cost-prohibitive
Patch management process
Asset classification
Encryption
36. Same intent as a cracker but does not have the technical skills and knowledge
Data owners
Multinational organization
Residual risk
Script kiddie
37. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Residual risk would be reduced by a greater amount
Strategic alignment of security with business objectives
Script kiddie
Lack of change management
38. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Identify the relevant systems and processes
Safeguards over keys
Defined objectives
Residual risk
39. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Tailgating
Residual risk would be reduced by a greater amount
Exceptions to policy
Security awareness training for all employees
40. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Internal risk assessment
Access control matrix
Digital certificate
Undervoltage (brownout)
41. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Patch management
Process of introducing changes to systems
Cross-site scripting attacks
Cyber extortionist
42. Company or person you believe will not send a virus-infect file knowingly
Virus detection
Examples of containment defenses
Trusted source
Encryption key management
43. Ensures that there are no scalability problems.
Stress testing
Resource dependency assessment
Well-defined roles and responsibilities
Confidentiality
44. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Compliance with the organization's information security requirements
Examples of containment defenses
Lack of change management
Data mart
45. All within the responsibility of the information security manager.
Platform security - intrusion detection and antivirus controls
Reduce risk to an acceptable level
Centralized structure
Negotiating a local version of the organization standards
46. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Role-based policy
Normalization
Biometric access control systems
IP address packet filtering
47. A risk assessment should be conducted _________________.
Encryption
Security risk
Annually or whenever there is a significant change
Knowledge management
48. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Continuous monitoring control initiatives
Internal risk assessment
Spoofing attacks
Cyber terrorist
49. By definition are not previously known and therefore are undetectable.
0-day vulnerabilities
Waterfall chart
Regulatory compliance
Security baselines
50. Provides process needs but not impact.
MAL wear
BIA (Business Impact Assessment
Resource dependency assessment
Asset classification