SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
IP address packet filtering
Skills inventory
Background check
include security responsibilities in a job description
2. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Do with the information it collects
Attributes and characteristics of the 'desired state'
Role-based access control
Knowledge management
3. Program that hides within or looks like a legit program
Personal firewall
Key controls
Well-defined roles and responsibilities
Trojan horse
4. Programs that act without a user's knowledge and deliberately alter a computer's operations
MAL wear
Cost of control
Methodology used in the assessment
Strategic alignment of security with business objectives
5. Culture has a significant impact on how information security will be implemented in a ______________________.
Reduce risk to an acceptable level
Well-defined roles and responsibilities
Multinational organization
Trusted source
6. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Asset classification
Identify the relevant systems and processes
Conduct a risk assessment
Multinational organization
7. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Acceptable use policies
Cross-site scripting attacks
Cracker
Control risk
8. The MOST important element of an information security strategy.
Defined objectives
Worm
Identify the relevant systems and processes
Return on security investment (ROSI)
9. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Exceptions to policy
Reduce risk to an acceptable level
Alignment with business strategy
Patch management process
10. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Cyber terrorist
Residual risk
Access control matrix
Script kiddie
11. A risk assessment should be conducted _________________.
Normalization
The board of directors and senior management
Annually or whenever there is a significant change
Alignment with business strategy
12. Someone who uses the internet or network to destroy or damage computers for political reasons
Defining high-level business security requirements
Owner of the information asset
Script kiddie
Cyber terrorist
13. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Proficiency testing
Negotiating a local version of the organization standards
Script kiddie
Certificate authority (CA)
14. All within the responsibility of the information security manager.
Proficiency testing
Platform security - intrusion detection and antivirus controls
Reduce risk to an acceptable level
MAL wear
15. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Cost of control
Background checks of prospective employees
People
Role-based policy
16. Provides process needs but not impact.
Attributes and characteristics of the 'desired state'
Centralized structure
Malicious software and spyware
Resource dependency assessment
17. Useful but only with regard to specific technical skills.
Compliance with the organization's information security requirements
Do with the information it collects
Proficiency testing
Aligned with organizational goals
18. The best measure for preventing the unauthorized disclosure of confidential information.
Owner of the information asset
Knowledge management
Notifications and opt-out provisions
Acceptable use policies
19. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Tailgating
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Virus
Detection defenses
20. Company or person you believe will not send a virus-infect file knowingly
Consensus on risks and controls
Trusted source
Prioritization
Process of introducing changes to systems
21. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Platform security - intrusion detection and antivirus controls
Multinational organization
Two-factor authentication
Knowledge management
22. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Acceptable use policies
Regular review of access control lists
Requirements of the data owners
People
23. A method for analyzing and reducing a relational database to its most streamlined form
Protective switch covers
Normalization
Regulatory compliance
The database administrator
24. Same intent as a cracker but does not have the technical skills and knowledge
Hacker
Control risk
Acceptable use policies
Script kiddie
25. S small warehouse - designed for the end-user needs in a strategic business unit
Data mart
Deeper level of analysis
Malicious software and spyware
Cyber terrorist
26. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Trojan horse
Countermeasure cost-benefit analysis
Identify the vulnerable systems and apply compensating controls
Waterfall chart
27. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Centralization of information security management
Data isolation
The data owner
Breakeven point of risk reduction and cost
28. Information security governance models are highly dependent on the _____________________.
The information security officer
Acceptable use policies
Overall organizational structure
Platform security - intrusion detection and antivirus controls
29. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Get senior management onboard
Safeguards over keys
Vulnerability assessment
Patch management process
30. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Penetration testing
Get senior management onboard
Virus
The data custodian
31. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. Oversees the overall classification management of the information.
Retention of business records
Cracker
Prioritization
The information security officer
33. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Cracker
Security risk
Virus detection
Creation of a business continuity plan
34. Risk should be reduced to a level that an organization _____________.
Is willing to accept
Attributes and characteristics of the 'desired state'
Key risk indicator (KRI) setup
Calculating the value of the information or asset
35. Occurs when the electrical supply drops
Deeper level of analysis
Undervoltage (brownout)
Support the business objectives of the organization
Service level agreements (SLAs)
36. The primary role of the information security manager in the process of information classification within the organization.
Security risk
Defining and ratifying the classification structure of information assets
Public key infrastructure (PKI)
Annual loss expectancy (ALE)calculations
37. Should be determined from the risk assessment results.
Data owners
Audit objectives
Strategic alignment of security with business objectives
Assess the risks to the business operation
38. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Intrusion detection system (IDS)
Data isolation
Reduce risk to an acceptable level
The data owner
39. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
The data owner
Equal error rate (EER)
Platform security - intrusion detection and antivirus controls
Defined objectives
40. Whenever personal data are transferred across national boundaries; ________________________ are required.
Aligned with organizational goals
Risk appetite
Background checks of prospective employees
The awareness and agreement of the data subjects
41. Occurs when the incoming level
Power surge/over voltage (spike)
Safeguards over keys
Is willing to accept
Skills inventory
42. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Calculating the value of the information or asset
Transmit e-mail messages
Increase business value and confidence
Tailgating
43. Computer that has duplicate components so it can continue to operate when one of its main components fail
Fault-tolerant computer
Resource dependency assessment
Control risk
The awareness and agreement of the data subjects
44. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Methodology used in the assessment
Spoofing attacks
Encryption of the hard disks
Equal error rate (EER)
45. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Transferred risk
Security baselines
Alignment with business strategy
Data classification
46. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Tailgating
Classification of assets needs
Knowledge management
The authentication process is broken
47. Only valid if assets have first been identified and appropriately valued.
Gain unauthorized access to applications
Annual loss expectancy (ALE)calculations
Creation of a business continuity plan
Residual risk
48. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Patch management
Breakeven point of risk reduction and cost
Exceptions to policy
49. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Detection defenses
Encryption key management
Phishing
Performing a risk assessment
50. Has to be integrated into the requirements of every software application's design.
Patch management process
Encryption key management
Notifications and opt-out provisions
Certificate authority (CA)