SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Calculating the value of the information or asset
Rule-based access control
Data owners
2. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Notifications and opt-out provisions
Tailgating
Rule-based access control
Data isolation
3. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Knowledge management
Intrusion detection system (IDS)
Asset classification
Methodology used in the assessment
4. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Threat assessment
Control risk
Consensus on risks and controls
Internal risk assessment
5. Company or person you believe will not send a virus-infect file knowingly
Public key infrastructure (PKI)
Trusted source
Breakeven point of risk reduction and cost
Centralized structure
6. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Cost of control
Exceptions to policy
Skills inventory
The balanced scorecard
7. The best measure for preventing the unauthorized disclosure of confidential information.
Tailgating
Acceptable use policies
Multinational organization
Phishing
8. Should be a standard requirement for the service provider.
Digital certificate
The board of directors and senior management
Background check
Nondisclosure agreement (NDA)
9. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Continuous analysis - monitoring and feedback
All personnel
Biometric access control systems
Key risk indicator (KRI) setup
10. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Undervoltage (brownout)
Cracker
Risk assessment - evaluation and impact analysis
Cyber extortionist
11. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Nondisclosure agreement (NDA)
Cross-site scripting attacks
Role-based access control
Encryption
12. Inject malformed input.
Overall organizational structure
Cross-site scripting attacks
Conduct a risk assessment
include security responsibilities in a job description
13. Needs to define the access rules - which is troublesome and error prone in large organizations.
The information security officer
Centralization of information security management
Single sign-on (SSO) product
Rule-based access control
14. Computer that has duplicate components so it can continue to operate when one of its main components fail
Annually or whenever there is a significant change
Support the business objectives of the organization
Notifications and opt-out provisions
Fault-tolerant computer
15. Applications cannot access data associated with other apps
Transferred risk
Data isolation
Monitoring processes
Encryption of the hard disks
16. The most important characteristic of good security policies is that they be ____________________.
Requirements of the data owners
Security baselines
Defining high-level business security requirements
Aligned with organizational goals
17. Primarily reduce risk and are most effective for the protection of information assets.
Gain unauthorized access to applications
Exceptions to policy
Worm
Key controls
18. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Intrusion detection system (IDS)
MAL wear
People
Defined objectives
19. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Digital signatures
Intrusion detection system (IDS)
Negotiating a local version of the organization standards
Gap analysis
20. A Successful risk management should lead to a ________________.
Protective switch covers
Breakeven point of risk reduction and cost
Data mart
IP address packet filtering
21. Cannot be minimized
Inherent risk
Role-based access control
Access control matrix
Transmit e-mail messages
22. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Access control matrix
Countermeasure cost-benefit analysis
Detection defenses
Impractical and is often cost-prohibitive
23. The information security manager needs to prioritize the controls based on ________________________.
Key risk indicator (KRI) setup
Risk management and the requirements of the organization
The authentication process is broken
Detection defenses
24. Someone who uses the internet or network to destroy or damage computers for political reasons
Cyber terrorist
Biometric access control systems
Audit objectives
Defined objectives
25. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. Awareness - training and physical security defenses.
Security code reviews for the entire software application
Residual risk would be reduced by a greater amount
Key controls
Examples of containment defenses
27. In order to highlight to management the importance of network security - the security manager should FIRST _______________.
Conduct a risk assessment
Creation of a business continuity plan
Prioritization
Regular review of access control lists
28. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Notifications and opt-out provisions
Monitoring processes
Rule-based access control
Cross-site scripting attacks
29. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Service level agreements (SLAs)
Platform security - intrusion detection and antivirus controls
Cracker
Role-based policy
30. Only valid if assets have first been identified and appropriately valued.
Security code reviews for the entire software application
Certificate authority (CA)
Annual loss expectancy (ALE)calculations
Data owners
31. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Single sign-on (SSO) product
Identify the vulnerable systems and apply compensating controls
Logon banners
People
32. The PRIMARY goal in developing an information security strategy is to: _________________________.
Gain unauthorized access to applications
Support the business objectives of the organization
Breakeven point of risk reduction and cost
Malicious software and spyware
33. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Residual risk would be reduced by a greater amount
Risk appetite
Transferred risk
Examples of containment defenses
34. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Security baselines
Cost of control
Comparison of cost of achievement
Key risk indicator (KRI) setup
35. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Developing an information security baseline
Well-defined roles and responsibilities
Transferred risk
Get senior management onboard
36. The MOST important element of an information security strategy.
Defined objectives
Support the business objectives of the organization
Do with the information it collects
Personal firewall
37. Accesses a computer or network illegally
Cracker
Classification of assets needs
Retention of business records
Logon banners
38. Uses security metrics to measure the performance of the information security program.
Information security manager
Deeper level of analysis
Centralized structure
Background check
39. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Inherent risk
BIA (Business Impact Assessment
Hacker
Support the business objectives of the organization
40. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Nondisclosure agreement (NDA)
Countermeasure cost-benefit analysis
Background checks of prospective employees
Security awareness training for all employees
41. Normally addressed through antivirus and antispyware policies.
Access control matrix
What happened and how the breach was resolved
Proficiency testing
Malicious software and spyware
42. Should be performed to identify the risk and determine needed controls.
SWOT analysis
Internal risk assessment
Control risk
Defined objectives
43. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Encryption of the hard disks
Key risk indicator (KRI) setup
Residual risk
Personal firewall
44. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Service level agreements (SLAs)
Cyber extortionist
Aligned with organizational goals
Vulnerability assessment
45. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Increase business value and confidence
Defining high-level business security requirements
Internal risk assessment
Digital certificate
46. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Threat assessment
Single sign-on (SSO) product
Certificate authority (CA)
Equal error rate (EER)
47. Ensures that there are no scalability problems.
Process of introducing changes to systems
The information security officer
Stress testing
The data owner
48. Carries out the technical administration.
Two-factor authentication
Cyber terrorist
Classification of assets needs
The database administrator
49. All within the responsibility of the information security manager.
Requirements of the data owners
Platform security - intrusion detection and antivirus controls
Logon banners
Comparison of cost of achievement
50. Most effective for evaluating the degree to which information security objectives are being met.
The balanced scorecard
Acceptable use policies
Certificate authority (CA)
Prioritization
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests