SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. By definition are not previously known and therefore are undetectable.
Data isolation
Strategic alignment of security with business objectives
Impractical and is often cost-prohibitive
0-day vulnerabilities
2. Has to be integrated into the requirements of every software application's design.
Regular review of access control lists
Methodology used in the assessment
OBusiness case development
Encryption key management
3. Someone who accesses a computer or network illegally
Compliance with the organization's information security requirements
Internal risk assessment
Hacker
Negotiating a local version of the organization standards
4. The job of the information security officer on a management team is to ___________________.
Script kiddie
Assess the risks to the business operation
Public key infrastructure (PKI)
Centralization of information security management
5. Applications cannot access data associated with other apps
Data isolation
Continuous monitoring control initiatives
Deeper level of analysis
IP address packet filtering
6. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
A network vulnerability assessment
Role-based access control
Decentralization
Overall organizational structure
7. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Key controls
Access control matrix
Strategic alignment of security with business objectives
Continuous monitoring control initiatives
8. When the ________________ is more than the cost of the risk - the risk should be accepted.
Defined objectives
Creation of a business continuity plan
Cracker
Cost of control
9. Normally addressed through antivirus and antispyware policies.
Gain unauthorized access to applications
Malicious software and spyware
Trusted source
Transferred risk
10. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Threat assessment
What happened and how the breach was resolved
Annually or whenever there is a significant change
Well-defined roles and responsibilities
11. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Digital certificate
Centralization of information security management
Knowledge management
The data owner
12. Information security governance models are highly dependent on the _____________________.
SWOT analysis
Countermeasure cost-benefit analysis
Aligned with organizational goals
Overall organizational structure
13. Culture has a significant impact on how information security will be implemented in a ______________________.
Role-based policy
Multinational organization
Tailgating
Spoofing attacks
14. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Encryption
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Biometric access control systems
Defined objectives
15. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Defining high-level business security requirements
Gap analysis
Applying the proper classification to the data
Virus
16. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Rule-based access control
Developing an information security baseline
Risk appetite
The database administrator
17. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Countermeasure cost-benefit analysis
Comparison of cost of achievement
Conduct a risk assessment
Retention of business records
18. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Access control matrix
Background checks of prospective employees
Developing an information security baseline
Role-based policy
19. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
The awareness and agreement of the data subjects
Risk appetite
Applying the proper classification to the data
Detection defenses
20. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Encryption of the hard disks
Support the business objectives of the organization
The information security officer
Calculating the value of the information or asset
21. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Intrusion detection system (IDS)
Control effectiveness
Regulatory compliance
IP address packet filtering
22. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Consensus on risks and controls
Normalization
Its ability to reduce or eliminate business risks
BIA (Business Impact Assessment
23. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Knowledge management
Is willing to accept
Vulnerability assessment
Get senior management onboard
24. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Phishing
Confidentiality
Conduct a risk assessment
Malicious software and spyware
25. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Defining and ratifying the classification structure of information assets
Notifications and opt-out provisions
Risk assessment - evaluation and impact analysis
Knowledge management
26. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Transferred risk
Security code reviews for the entire software application
IP address packet filtering
Role-based policy
27. A notice that guarantees a user or a web site is legitimate
Stress testing
Digital certificate
The data owner
Lack of change management
28. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Conduct a risk assessment
BIA (Business Impact Assessment
Exceptions to policy
Data classification
29. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
The board of directors and senior management
Worm
Nondisclosure agreement (NDA)
Detection defenses
30. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Gain unauthorized access to applications
Negotiating a local version of the organization standards
Security code reviews for the entire software application
Defined objectives
31. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Identify the vulnerable systems and apply compensating controls
OBusiness case development
Stress testing
Risk management and the requirements of the organization
32. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Impractical and is often cost-prohibitive
Multinational organization
Safeguards over keys
Control risk
33. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Certificate authority (CA)
Encryption key management
Security code reviews for the entire software application
Applying the proper classification to the data
34. The MOST important element of an information security strategy.
Penetration testing
Defined objectives
Prioritization
All personnel
35. Has full responsibility over data.
Digital certificate
The data owner
What happened and how the breach was resolved
Transferred risk
36. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Residual risk would be reduced by a greater amount
Encryption key management
Role-based policy
Asset classification
37. ecurity design flaws require a ____________________.
Identify the relevant systems and processes
Consensus on risks and controls
Reduce risk to an acceptable level
Deeper level of analysis
38. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Patch management
Key controls
Knowledge management
The board of directors and senior management
39. Should PRIMARILY be based on regulatory and legal requirements.
Retention of business records
Return on security investment (ROSI)
Inherent risk
Comparison of cost of achievement
40. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Background checks of prospective employees
Prioritization
Public key infrastructure (PKI)
Developing an information security baseline
41. provides the most effective protection of data on mobile devices.
Detection defenses
Encryption
Defining and ratifying the classification structure of information assets
Negotiating a local version of the organization standards
42. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Gain unauthorized access to applications
People
Assess the risks to the business operation
Waterfall chart
43. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Prioritization
Cyber extortionist
Lack of change management
Residual risk would be reduced by a greater amount
44. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Total cost of ownership (TCO)
Transmit e-mail messages
Audit objectives
Data isolation
45. A function of the session keys distributed by the PKI.
Performing a risk assessment
Vulnerability assessment
Confidentiality
Hacker
46. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Trojan horse
Increase business value and confidence
Performing a risk assessment
Stress testing
47. Provides process needs but not impact.
MAL wear
Defining high-level business security requirements
The data custodian
Resource dependency assessment
48. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Return on security investment (ROSI)
Do with the information it collects
Knowledge management
Transferred risk
49. Responsible for securing the information.
IP address packet filtering
Process of introducing changes to systems
The data custodian
Security code reviews for the entire software application
50. All within the responsibility of the information security manager.
Platform security - intrusion detection and antivirus controls
Impractical and is often cost-prohibitive
Data mart
Cyber terrorist
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests