SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Waterfall chart
Annual loss expectancy (ALE)calculations
Role-based access control
Owner of the information asset
2. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Transmit e-mail messages
Properly aligned with business goals and objectives
Cross-site scripting attacks
Continuous monitoring control initiatives
3. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Stress testing
Public key infrastructure (PKI)
Intrusion detection system (IDS)
Notifications and opt-out provisions
4. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Reduce risk to an acceptable level
Single sign-on (SSO) product
Developing an information security baseline
5. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Background check
Notifications and opt-out provisions
Identify the vulnerable systems and apply compensating controls
Overall organizational structure
6. To identify known vulnerabilities based on common misconfigurations and missing updates.
Defined objectives
Phishing
Assess the risks to the business operation
A network vulnerability assessment
7. Computer that has duplicate components so it can continue to operate when one of its main components fail
Fault-tolerant computer
Calculating the value of the information or asset
Risk appetite
Key risk indicator (KRI) setup
8. Identification and _______________ of business risk enables project managers to address areas with most significance.
Cyber terrorist
Prioritization
Asset classification
Stress testing
9. Useful but only with regard to specific technical skills.
Security awareness training for all employees
Compliance with the organization's information security requirements
Proficiency testing
Asset classification
10. Inject malformed input.
Cross-site scripting attacks
Countermeasure cost-benefit analysis
Cyber extortionist
Patch management
11. Ensures that there are no scalability problems.
Requirements of the data owners
The data custodian
Stress testing
Spoofing attacks
12. The data owner is responsible for _______________________.
Creation of a business continuity plan
Methodology used in the assessment
Internal risk assessment
Applying the proper classification to the data
13. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Negotiating a local version of the organization standards
Gap analysis
0-day vulnerabilities
Nondisclosure agreement (NDA)
14. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Comparison of cost of achievement
Safeguards over keys
Identify the relevant systems and processes
The data owner
15. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Notifications and opt-out provisions
Breakeven point of risk reduction and cost
Control risk
Overall organizational structure
16. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Regulatory compliance
Phishing
Proficiency testing
Equal error rate (EER)
17. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Waterfall chart
Annually or whenever there is a significant change
Key controls
Vulnerability assessment
18. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Alignment with business strategy
Normalization
Digital certificate
Data classification
20. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Trojan horse
Role-based policy
Use of security metrics
Tailgating
21. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Transferred risk
Continuous analysis - monitoring and feedback
OBusiness case development
Background check
22. All within the responsibility of the information security manager.
Certificate authority (CA)
Regulatory compliance
Platform security - intrusion detection and antivirus controls
Strategic alignment of security with business objectives
23. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Breakeven point of risk reduction and cost
Security awareness training for all employees
Residual risk would be reduced by a greater amount
The awareness and agreement of the data subjects
24. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Threat assessment
Information contained on the equipment
Risk appetite
Do with the information it collects
25. Should be a standard requirement for the service provider.
Background check
Increase business value and confidence
Gap analysis
Performing a risk assessment
26. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Background check
Examples of containment defenses
Role-based policy
Total cost of ownership (TCO)
27. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Transmit e-mail messages
Script kiddie
Personal firewall
include security responsibilities in a job description
28. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
The data owner
The information security officer
Security code reviews for the entire software application
Spoofing attacks
29. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Patch management process
Fault-tolerant computer
Cross-site scripting attacks
Exceptions to policy
30. Provides strong online authentication.
The balanced scorecard
Public key infrastructure (PKI)
OBusiness case development
Retention of business records
31. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Stress testing
include security responsibilities in a job description
Equal error rate (EER)
Fault-tolerant computer
32. Someone who accesses a computer or network illegally
The database administrator
Hacker
Cyber terrorist
Data mart
33. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Return on security investment (ROSI)
The data owner
Prioritization
Public key infrastructure (PKI)
34. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Waterfall chart
Notifications and opt-out provisions
Centralized structure
Defining high-level business security requirements
35. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Multinational organization
Knowledge management
MAL wear
Security baselines
36. Should be determined from the risk assessment results.
Trojan horse
Centralization of information security management
Audit objectives
Platform security - intrusion detection and antivirus controls
37. Reducing risk to a level too small to measure is _______________.
Impractical and is often cost-prohibitive
Regulatory compliance
Prioritization
Background checks of prospective employees
38. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Comparison of cost of achievement
IP address packet filtering
The data custodian
Deeper level of analysis
39. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Return on security investment (ROSI)
Creation of a business continuity plan
Knowledge management
Key controls
40. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Detection defenses
Aligned with organizational goals
Inherent risk
Hacker
41. Focuses on identifying vulnerabilities.
Control risk
Malicious software and spyware
Data warehouse
Penetration testing
42. Occurs when the electrical supply drops
Undervoltage (brownout)
IP address packet filtering
Well-defined roles and responsibilities
Total cost of ownership (TCO)
43. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Script kiddie
Control effectiveness
Aligned with organizational goals
Data owners
44. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Its ability to reduce or eliminate business risks
Security awareness training for all employees
Developing an information security baseline
Tie security risks to key business objectives
45. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Encryption of the hard disks
Lack of change management
Owner of the information asset
The information security officer
46. By definition are not previously known and therefore are undetectable.
0-day vulnerabilities
Alignment with business strategy
Fault-tolerant computer
SWOT analysis
47. The job of the information security officer on a management team is to ___________________.
Assess the risks to the business operation
Do with the information it collects
Applying the proper classification to the data
Methodology used in the assessment
48. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
The data custodian
Annually or whenever there is a significant change
Single sign-on (SSO) product
Data warehouse
49. A method for analyzing and reducing a relational database to its most streamlined form
Spoofing attacks
Normalization
Internal risk assessment
Comparison of cost of achievement
50. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Use of security metrics
Single sign-on (SSO) product
Total cost of ownership (TCO)
Cyber extortionist