SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Control effectiveness
Patch management
Role-based policy
Single sign-on (SSO) product
2. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Fault-tolerant computer
Patch management
Logon banners
Residual risk
3. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Continuous analysis - monitoring and feedback
include security responsibilities in a job description
Decentralization
Its ability to reduce or eliminate business risks
4. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Role-based policy
Vulnerability assessment
Creation of a business continuity plan
Residual risk would be reduced by a greater amount
5. Awareness - training and physical security defenses.
Owner of the information asset
Logon banners
Examples of containment defenses
Increase business value and confidence
6. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
The database administrator
Personal firewall
Residual risk would be reduced by a greater amount
Assess the risks to the business operation
7. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Properly aligned with business goals and objectives
Owner of the information asset
Applying the proper classification to the data
8. The primary role of the information security manager in the process of information classification within the organization.
People
Tie security risks to key business objectives
Defining and ratifying the classification structure of information assets
Return on security investment (ROSI)
9. The most important characteristic of good security policies is that they be ____________________.
Aligned with organizational goals
Data classification
Increase business value and confidence
Trusted source
10. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Power surge/over voltage (spike)
IP address packet filtering
Encryption key management
Return on security investment (ROSI)
11. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Decentralization
Retention of business records
Control effectiveness
Virus detection
12. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Alignment with business strategy
Risk appetite
Fault-tolerant computer
Properly aligned with business goals and objectives
13. Identification and _______________ of business risk enables project managers to address areas with most significance.
Regular review of access control lists
Prioritization
Examples of containment defenses
Access control matrix
14. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Data owners
Patch management
Virus
Protective switch covers
15. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
All personnel
Negotiating a local version of the organization standards
Use of security metrics
Spoofing attacks
16. A repository of historical data organized by subject to support decision makers in the org
Data warehouse
Methodology used in the assessment
Annual loss expectancy (ALE)calculations
Continuous monitoring control initiatives
17. Needs to define the access rules - which is troublesome and error prone in large organizations.
Increase business value and confidence
Encryption of the hard disks
Rule-based access control
The data custodian
18. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Risk appetite
Countermeasure cost-benefit analysis
Skills inventory
What happened and how the breach was resolved
19. Accesses a computer or network illegally
Classification of assets needs
Personal firewall
Cracker
All personnel
20. When the ________________ is more than the cost of the risk - the risk should be accepted.
Logon banners
Knowledge management
Normalization
Cost of control
21. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Identify the relevant systems and processes
Well-defined roles and responsibilities
Two-factor authentication
Stress testing
22. Would protect against spoofing an internal address but would not provide strong authentication.
Assess the risks to the business operation
OBusiness case development
The data owner
IP address packet filtering
23. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Data classification
Risk appetite
Biometric access control systems
All personnel
24. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Data mart
MAL wear
Multinational organization
Vulnerability assessment
25. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Retention of business records
Countermeasure cost-benefit analysis
Intrusion detection system (IDS)
Vulnerability assessment
26. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Security risk
Centralized structure
Control risk
Comparison of cost of achievement
27. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Annually or whenever there is a significant change
Gain unauthorized access to applications
Key risk indicator (KRI) setup
Virus
28. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
include security responsibilities in a job description
Alignment with business strategy
Centralization of information security management
The board of directors and senior management
29. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Defined objectives
Cross-site scripting attacks
Centralized structure
Cryptographic secure sockets layer (SSL) implementations and short key lengths
30. Utility program that detects and protects a personal computer from unauthorized intrusions
Risk appetite
Its ability to reduce or eliminate business risks
Personal firewall
Defining and ratifying the classification structure of information assets
31. Provides process needs but not impact.
Data owners
Data isolation
Resource dependency assessment
Risk assessment - evaluation and impact analysis
32. Reducing risk to a level too small to measure is _______________.
Impractical and is often cost-prohibitive
Stress testing
Use of security metrics
Prioritization
33. Whenever personal data are transferred across national boundaries; ________________________ are required.
The awareness and agreement of the data subjects
Baseline standard and then develop additional standards
Transmit e-mail messages
SWOT analysis
34. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Security risk
Monitoring processes
Calculating the value of the information or asset
Rule-based access control
35. A function of the session keys distributed by the PKI.
Continuous analysis - monitoring and feedback
The database administrator
Cost of control
Confidentiality
36. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Intrusion detection system (IDS)
Threat assessment
Compliance with the organization's information security requirements
Information contained on the equipment
37. Someone who uses the internet or network to destroy or damage computers for political reasons
Cyber terrorist
Countermeasure cost-benefit analysis
Gain unauthorized access to applications
Strategic alignment of security with business objectives
38. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Waterfall chart
The information security officer
Virus
The authentication process is broken
39. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Security risk
Exceptions to policy
Threat assessment
Security awareness training for all employees
40. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Owner of the information asset
Power surge/over voltage (spike)
Control effectiveness
Decentralization
41. Has full responsibility over data.
Security baselines
Stress testing
The data owner
Do with the information it collects
42. Company or person you believe will not send a virus-infect file knowingly
Trusted source
IP address packet filtering
Data owners
Regular review of access control lists
43. Should be performed to identify the risk and determine needed controls.
Total cost of ownership (TCO)
Exceptions to policy
Internal risk assessment
Risk assessment - evaluation and impact analysis
44. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Regular review of access control lists
What happened and how the breach was resolved
Patch management
Proficiency testing
45. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Return on security investment (ROSI)
Creation of a business continuity plan
Spoofing attacks
Transmit e-mail messages
46. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Risk appetite
Protective switch covers
Identify the vulnerable systems and apply compensating controls
Reduce risk to an acceptable level
47. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Impractical and is often cost-prohibitive
Countermeasure cost-benefit analysis
Audit objectives
Attributes and characteristics of the 'desired state'
48. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
SWOT analysis
Classification of assets needs
Trusted source
Digital certificate
49. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Regular review of access control lists
Two-factor authentication
Key risk indicator (KRI) setup
OBusiness case development
50. It is more efficient to establish a ___________________for locations that must meet specific requirements.
The board of directors and senior management
Undervoltage (brownout)
0-day vulnerabilities
Baseline standard and then develop additional standards