SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Rule-based access control
Audit objectives
Increase business value and confidence
Comparison of cost of achievement
2. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Residual risk would be reduced by a greater amount
Data classification
Methodology used in the assessment
Residual risk
3. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Background checks of prospective employees
MAL wear
Security awareness training for all employees
Vulnerability assessment
4. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Retention of business records
Calculating the value of the information or asset
The authentication process is broken
Undervoltage (brownout)
5. Same intent as a cracker but does not have the technical skills and knowledge
Prioritization
Vulnerability assessment
include security responsibilities in a job description
Script kiddie
6. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Tailgating
Transferred risk
Countermeasure cost-benefit analysis
Retention of business records
7. The primary role of the information security manager in the process of information classification within the organization.
Data warehouse
Penetration testing
Defining and ratifying the classification structure of information assets
The board of directors and senior management
8. Cannot be minimized
Comparison of cost of achievement
Inherent risk
The awareness and agreement of the data subjects
Attributes and characteristics of the 'desired state'
9. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Two-factor authentication
Phishing
Background checks of prospective employees
Knowledge management
10. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Platform security - intrusion detection and antivirus controls
Logon banners
Regulatory compliance
Alignment with business strategy
11. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Risk appetite
Properly aligned with business goals and objectives
Undervoltage (brownout)
Access control matrix
12. In order to highlight to management the importance of network security - the security manager should FIRST _______________.
Encryption
Breakeven point of risk reduction and cost
Prioritization
Conduct a risk assessment
13. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Security awareness training for all employees
Performing a risk assessment
Residual risk
Information contained on the equipment
14. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Internal risk assessment
Stress testing
Annual loss expectancy (ALE)calculations
Identify the relevant systems and processes
15. Risk should be reduced to a level that an organization _____________.
Resource dependency assessment
OBusiness case development
Applying the proper classification to the data
Is willing to accept
16. ecurity design flaws require a ____________________.
Risk appetite
Deeper level of analysis
Increase business value and confidence
Compliance with the organization's information security requirements
17. Accesses a computer or network illegally
Digital certificate
Power surge/over voltage (spike)
Cracker
Vulnerability assessment
18. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Role-based policy
IP address packet filtering
Increase business value and confidence
Countermeasure cost-benefit analysis
19. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Fault-tolerant computer
Certificate authority (CA)
Skills inventory
Digital certificate
20. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Get senior management onboard
Certificate authority (CA)
Biometric access control systems
Audit objectives
21. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Breakeven point of risk reduction and cost
Role-based access control
Spoofing attacks
Use of security metrics
22. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Asset classification
IP address packet filtering
Script kiddie
Return on security investment (ROSI)
23. Identification and _______________ of business risk enables project managers to address areas with most significance.
Support the business objectives of the organization
Key controls
Methodology used in the assessment
Prioritization
24. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Lack of change management
Owner of the information asset
Regulatory compliance
Its ability to reduce or eliminate business risks
25. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Security risk
Continuous analysis - monitoring and feedback
Retention of business records
The board of directors and senior management
26. Useful but only with regard to specific technical skills.
Certificate authority (CA)
Defined objectives
Proficiency testing
Intrusion detection system (IDS)
27. Primarily reduce risk and are most effective for the protection of information assets.
Key controls
Data mart
Residual risk would be reduced by a greater amount
Access control matrix
28. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Residual risk would be reduced by a greater amount
Biometric access control systems
Spoofing attacks
Key controls
29. Reducing risk to a level too small to measure is _______________.
Data mart
Consensus on risks and controls
Impractical and is often cost-prohibitive
Proficiency testing
30. The best measure for preventing the unauthorized disclosure of confidential information.
Encryption
Acceptable use policies
Alignment with business strategy
include security responsibilities in a job description
31. All within the responsibility of the information security manager.
Encryption of the hard disks
Gain unauthorized access to applications
Role-based access control
Platform security - intrusion detection and antivirus controls
32. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
People
Waterfall chart
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Patch management
33. Responsible for securing the information.
The data custodian
Classification of assets needs
Undervoltage (brownout)
Applying the proper classification to the data
34. Culture has a significant impact on how information security will be implemented in a ______________________.
Background checks of prospective employees
Multinational organization
Use of security metrics
Is willing to accept
35. An information security manager has to impress upon the human resources department the need for _____________________.
Security awareness training for all employees
Certificate authority (CA)
The database administrator
Script kiddie
36. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Retention of business records
Notifications and opt-out provisions
Service level agreements (SLAs)
Equal error rate (EER)
37. A Successful risk management should lead to a ________________.
Data mart
Vulnerability assessment
Breakeven point of risk reduction and cost
Notifications and opt-out provisions
38. Should be performed to identify the risk and determine needed controls.
Internal risk assessment
Total cost of ownership (TCO)
Key risk indicator (KRI) setup
Applying the proper classification to the data
39. BEST option to improve accountability for a system administrator is to _____________________.
Cracker
Comparison of cost of achievement
Risk assessment - evaluation and impact analysis
include security responsibilities in a job description
40. Occurs when the incoming level
Support the business objectives of the organization
Developing an information security baseline
Power surge/over voltage (spike)
Script kiddie
41. Uses security metrics to measure the performance of the information security program.
Total cost of ownership (TCO)
Information security manager
Key controls
Well-defined roles and responsibilities
42. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Data owners
Lack of change management
Cracker
Creation of a business continuity plan
43. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Return on security investment (ROSI)
Threat assessment
Monitoring processes
Cross-site scripting attacks
44. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Acceptable use policies
Baseline standard and then develop additional standards
Defined objectives
Transferred risk
45. Whenever personal data are transferred across national boundaries; ________________________ are required.
Do with the information it collects
Its ability to reduce or eliminate business risks
The awareness and agreement of the data subjects
Continuous analysis - monitoring and feedback
46. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Cracker
Key risk indicator (KRI) setup
Decentralization
Comparison of cost of achievement
47. Carries out the technical administration.
The database administrator
MAL wear
Impractical and is often cost-prohibitive
Protective switch covers
48. Occurs when the electrical supply drops
Two-factor authentication
Return on security investment (ROSI)
Regular review of access control lists
Undervoltage (brownout)
49. Awareness - training and physical security defenses.
Examples of containment defenses
Personal firewall
Continuous analysis - monitoring and feedback
Gap analysis
50. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Nondisclosure agreement (NDA)
Key controls
Gain unauthorized access to applications
Knowledge management