SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Programs that act without a user's knowledge and deliberately alter a computer's operations
Cost of control
Digital certificate
MAL wear
Prioritization
2. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
BIA (Business Impact Assessment
Security awareness training for all employees
Role-based policy
Negotiating a local version of the organization standards
3. Used to understand the flow of one process into another.
Waterfall chart
Support the business objectives of the organization
Transmit e-mail messages
include security responsibilities in a job description
4. Occurs when the electrical supply drops
Undervoltage (brownout)
Increase business value and confidence
Calculating the value of the information or asset
Worm
5. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Gap analysis
Control effectiveness
The database administrator
People
6. Uses security metrics to measure the performance of the information security program.
The information security officer
Information security manager
Exceptions to policy
Defining and ratifying the classification structure of information assets
7. S small warehouse - designed for the end-user needs in a strategic business unit
Data mart
Nondisclosure agreement (NDA)
Prioritization
Hacker
8. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Risk appetite
Decentralization
Defining high-level business security requirements
Data owners
9. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
SWOT analysis
Intrusion detection system (IDS)
Residual risk would be reduced by a greater amount
Continuous monitoring control initiatives
10. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Personal firewall
Skills inventory
Virus detection
Data owners
11. BEST option to improve accountability for a system administrator is to _____________________.
Asset classification
Retention of business records
Script kiddie
include security responsibilities in a job description
12. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Confidentiality
Continuous monitoring control initiatives
Notifications and opt-out provisions
Process of introducing changes to systems
13. Accesses a computer or network illegally
Encryption
Cracker
Logon banners
Data warehouse
14. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Background checks of prospective employees
Security baselines
Lack of change management
Biometric access control systems
15. Provides strong online authentication.
Regulatory compliance
Public key infrastructure (PKI)
Fault-tolerant computer
Security baselines
16. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Consensus on risks and controls
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Skills inventory
Cost of control
17. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Identify the relevant systems and processes
Notifications and opt-out provisions
Exceptions to policy
Control risk
18. By definition are not previously known and therefore are undetectable.
Cyber extortionist
0-day vulnerabilities
Transmit e-mail messages
Comparison of cost of achievement
19. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Virus detection
Service level agreements (SLAs)
Cross-site scripting attacks
BIA (Business Impact Assessment
20. The information security manager needs to prioritize the controls based on ________________________.
Digital signatures
Risk management and the requirements of the organization
OBusiness case development
Impractical and is often cost-prohibitive
21. Carries out the technical administration.
Data classification
The database administrator
Risk management and the requirements of the organization
Lack of change management
22. Should PRIMARILY be based on regulatory and legal requirements.
include security responsibilities in a job description
Data warehouse
Retention of business records
Conduct a risk assessment
23. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Safeguards over keys
Single sign-on (SSO) product
The balanced scorecard
Skills inventory
24. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Proficiency testing
Two-factor authentication
The information security officer
Risk management and the requirements of the organization
25. Computer that has duplicate components so it can continue to operate when one of its main components fail
Identify the relevant systems and processes
Countermeasure cost-benefit analysis
Developing an information security baseline
Fault-tolerant computer
26. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Get senior management onboard
Certificate authority (CA)
Single sign-on (SSO) product
Risk management and the requirements of the organization
27. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Transferred risk
Digital certificate
Support the business objectives of the organization
The data custodian
28. The MOST important element of an information security strategy.
Well-defined roles and responsibilities
Defined objectives
Resource dependency assessment
Annually or whenever there is a significant change
29. Provides process needs but not impact.
Trusted source
Virus
Resource dependency assessment
Data mart
30. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Malicious software and spyware
Trusted source
Information contained on the equipment
Methodology used in the assessment
31. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Certificate authority (CA)
Gain unauthorized access to applications
MAL wear
The awareness and agreement of the data subjects
32. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Tailgating
Alignment with business strategy
Retention of business records
Phishing
33. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Key risk indicator (KRI) setup
Fault-tolerant computer
Phishing
Control risk
34. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Well-defined roles and responsibilities
Developing an information security baseline
Worm
All personnel
35. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
MAL wear
Encryption of the hard disks
Defined objectives
Defining high-level business security requirements
36. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Data warehouse
Hacker
Use of security metrics
Creation of a business continuity plan
37. Should be performed to identify the risk and determine needed controls.
Asset classification
Internal risk assessment
Risk management and the requirements of the organization
Regulatory compliance
38. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
The data custodian
Well-defined roles and responsibilities
Developing an information security baseline
Deeper level of analysis
39. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Spoofing attacks
Key risk indicator (KRI) setup
Risk management and the requirements of the organization
Defined objectives
40. Without _____________________ - there cannot be accountability.
Encryption
Well-defined roles and responsibilities
The balanced scorecard
Gain unauthorized access to applications
41. Identification and _______________ of business risk enables project managers to address areas with most significance.
0-day vulnerabilities
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Return on security investment (ROSI)
Prioritization
42. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Virus
Return on security investment (ROSI)
Trojan horse
Inherent risk
43. Responsible for securing the information.
Trusted source
Exceptions to policy
The data custodian
Tie security risks to key business objectives
44. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Trusted source
Security baselines
Virus detection
Cost of control
45. When defining the information classification policy - the ___________________ need to be identified.
Patch management
Security risk
Requirements of the data owners
Data classification
46. Same intent as a cracker but does not have the technical skills and knowledge
Access control matrix
Protective switch covers
Acceptable use policies
Script kiddie
47. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Countermeasure cost-benefit analysis
Comparison of cost of achievement
Exceptions to policy
Virus
48. The PRIMARY goal in developing an information security strategy is to: _________________________.
Annually or whenever there is a significant change
Retention of business records
Information security manager
Support the business objectives of the organization
49. Primarily reduce risk and are most effective for the protection of information assets.
Digital certificate
Performing a risk assessment
Comparison of cost of achievement
Key controls
50. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Logon banners
Strategic alignment of security with business objectives
Compliance with the organization's information security requirements
Breakeven point of risk reduction and cost