SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A notice that guarantees a user or a web site is legitimate
Regulatory compliance
Gap analysis
BIA (Business Impact Assessment
Digital certificate
2. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Internal risk assessment
Gap analysis
Total cost of ownership (TCO)
Control effectiveness
3. Focuses on identifying vulnerabilities.
Digital signatures
Phishing
Penetration testing
Internal risk assessment
4. A key indicator of performance measurement.
Breakeven point of risk reduction and cost
Strategic alignment of security with business objectives
Penetration testing
Skills inventory
5. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
IP address packet filtering
Threat assessment
Continuous analysis - monitoring and feedback
Return on security investment (ROSI)
6. Has to be integrated into the requirements of every software application's design.
Encryption key management
Alignment with business strategy
Well-defined roles and responsibilities
Cost of control
7. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Detection defenses
Information security manager
Spoofing attacks
Regulatory compliance
8. Programs that act without a user's knowledge and deliberately alter a computer's operations
Lack of change management
MAL wear
Deeper level of analysis
Undervoltage (brownout)
9. ecurity design flaws require a ____________________.
Trusted source
Deeper level of analysis
Defined objectives
Public key infrastructure (PKI)
10. The PRIMARY goal in developing an information security strategy is to: _________________________.
Creation of a business continuity plan
Support the business objectives of the organization
Skills inventory
Logon banners
11. A Successful risk management should lead to a ________________.
Breakeven point of risk reduction and cost
Negotiating a local version of the organization standards
Asset classification
Residual risk would be reduced by a greater amount
12. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
All personnel
Methodology used in the assessment
Penetration testing
Impractical and is often cost-prohibitive
13. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Phishing
Examples of containment defenses
SWOT analysis
Gap analysis
14. Oversees the overall classification management of the information.
The information security officer
Phishing
Attributes and characteristics of the 'desired state'
Protective switch covers
15. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Information security manager
Tailgating
Risk management and the requirements of the organization
Defining high-level business security requirements
16. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Deeper level of analysis
Data isolation
Lack of change management
Equal error rate (EER)
17. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Well-defined roles and responsibilities
Increase business value and confidence
Monitoring processes
Resource dependency assessment
18. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Logon banners
Data owners
Multinational organization
Annual loss expectancy (ALE)calculations
19. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Proficiency testing
Process of introducing changes to systems
OBusiness case development
Digital certificate
20. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Trusted source
Personal firewall
The authentication process is broken
Conduct a risk assessment
21. The job of the information security officer on a management team is to ___________________.
Digital signatures
Inherent risk
Assess the risks to the business operation
People
22. Provide metrics to which outsourcing firms can be held accountable.
Centralization of information security management
Intrusion detection system (IDS)
Service level agreements (SLAs)
Audit objectives
23. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
The awareness and agreement of the data subjects
Personal firewall
Encryption of the hard disks
Continuous monitoring control initiatives
24. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Exceptions to policy
Role-based policy
Virus detection
Risk appetite
25. Someone who accesses a computer or network illegally
Comparison of cost of achievement
Hacker
Gain unauthorized access to applications
Skills inventory
26. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Cracker
All personnel
Trusted source
Get senior management onboard
27. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
28. Awareness - training and physical security defenses.
Examples of containment defenses
Lack of change management
Script kiddie
OBusiness case development
29. Responsible for securing the information.
Knowledge management
The data custodian
Do with the information it collects
Intrusion detection system (IDS)
30. In order to highlight to management the importance of network security - the security manager should FIRST _______________.
Conduct a risk assessment
Baseline standard and then develop additional standards
Digital signatures
Annual loss expectancy (ALE)calculations
31. Company or person you believe will not send a virus-infect file knowingly
Encryption key management
Digital signatures
Performing a risk assessment
Trusted source
32. Uses security metrics to measure the performance of the information security program.
Information security manager
Protective switch covers
Transferred risk
Examples of containment defenses
33. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Security code reviews for the entire software application
Strategic alignment of security with business objectives
Rule-based access control
Cross-site scripting attacks
34. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Overall organizational structure
Countermeasure cost-benefit analysis
Information contained on the equipment
Data owners
35. Occurs after the risk assessment process - it does not measure it.
Use of security metrics
Key risk indicator (KRI) setup
The authentication process is broken
Safeguards over keys
36. Should PRIMARILY be based on regulatory and legal requirements.
Phishing
Retention of business records
Calculating the value of the information or asset
Owner of the information asset
37. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Two-factor authentication
Comparison of cost of achievement
Centralization of information security management
Resource dependency assessment
38. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Role-based policy
Aligned with organizational goals
The awareness and agreement of the data subjects
Reduce risk to an acceptable level
39. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Asset classification
Is willing to accept
Defining and ratifying the classification structure of information assets
Patch management
40. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Acceptable use policies
Cyber terrorist
Tie security risks to key business objectives
Service level agreements (SLAs)
41. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Requirements of the data owners
Overall organizational structure
Reduce risk to an acceptable level
Multinational organization
42. When defining the information classification policy - the ___________________ need to be identified.
Is willing to accept
Security code reviews for the entire software application
Tailgating
Requirements of the data owners
43. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Breakeven point of risk reduction and cost
Cyber terrorist
Applying the proper classification to the data
Role-based access control
44. Whenever personal data are transferred across national boundaries; ________________________ are required.
Role-based access control
The awareness and agreement of the data subjects
Developing an information security baseline
SWOT analysis
45. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Worm
Attributes and characteristics of the 'desired state'
Consensus on risks and controls
Malicious software and spyware
46. Ensure that transmitted information can be attributed to the named sender.
Internal risk assessment
Background checks of prospective employees
Digital signatures
Calculating the value of the information or asset
47. BEST option to improve accountability for a system administrator is to _____________________.
include security responsibilities in a job description
Gain unauthorized access to applications
Total cost of ownership (TCO)
Cyber extortionist
48. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Risk assessment - evaluation and impact analysis
Internal risk assessment
Its ability to reduce or eliminate business risks
Multinational organization
49. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
SWOT analysis
Penetration testing
Logon banners
Trojan horse
50. Occurs when the incoming level
The database administrator
Power surge/over voltage (spike)
Role-based policy
Do with the information it collects