Test your basic knowledge |

CISM: Certified Information Security Manager

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Most effective for evaluating the degree to which information security objectives are being met.






2. Programs that act without a user's knowledge and deliberately alter a computer's operations






3. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.






4. Applications cannot access data associated with other apps






5. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability






6. BEST option to improve accountability for a system administrator is to _____________________.






7. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.






8. Uses security metrics to measure the performance of the information security program.






9. Information security governance models are highly dependent on the _____________________.






10. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.






11. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.






12. Without _____________________ - there cannot be accountability.






13. The data owner is responsible for _______________________.






14. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -






15. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.






16. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.






17. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.






18. Has to be integrated into the requirements of every software application's design.






19. A risk assessment should be conducted _________________.






20. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.






21. Responsible for securing the information.






22. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.






23. The primary role of the information security manager in the process of information classification within the organization.






24. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.






25. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.






26. Provides process needs but not impact.






27. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i






28. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.






29. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.






30. Provide metrics to which outsourcing firms can be held accountable.






31. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.






32. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.






33. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.






34. Occurs when the electrical supply drops






35. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.






36. A process that helps organizations manipulate important knowledge that is part of the orgs. memory






37. Same intent as a cracker but does not have the technical skills and knowledge






38. Focuses on identifying vulnerabilities.






39. A notice that guarantees a user or a web site is legitimate






40. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.






41. It is easier to manage and control a _________________.






42. It is more efficient to establish a ___________________for locations that must meet specific requirements.






43. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.






44. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.






45. Accesses a computer or network illegally






46. The most important characteristic of good security policies is that they be ____________________.






47. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.






48. In order to highlight to management the importance of network security - the security manager should FIRST _______________.






49. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information






50. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests