SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides process needs but not impact.
The database administrator
Resource dependency assessment
Risk management and the requirements of the organization
Compliance with the organization's information security requirements
2. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Penetration testing
Key risk indicator (KRI) setup
Data owners
Encryption of the hard disks
3. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Patch management
Centralized structure
Get senior management onboard
Background checks of prospective employees
4. Applications cannot access data associated with other apps
Data isolation
Penetration testing
Security awareness training for all employees
The board of directors and senior management
5. A key indicator of performance measurement.
Strategic alignment of security with business objectives
Tailgating
Tie security risks to key business objectives
Cross-site scripting attacks
6. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Deeper level of analysis
Identify the relevant systems and processes
BIA (Business Impact Assessment
Annually or whenever there is a significant change
7. Accesses a computer or network illegally
Performing a risk assessment
Cracker
Encryption
Transferred risk
8. Provide metrics to which outsourcing firms can be held accountable.
Get senior management onboard
Service level agreements (SLAs)
Cyber extortionist
Proficiency testing
9. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
Biometric access control systems
Identify the relevant systems and processes
Hacker
All personnel
10. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
People
Creation of a business continuity plan
Decentralization
Key controls
11. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Trojan horse
The board of directors and senior management
Key controls
Do with the information it collects
12. Company or person you believe will not send a virus-infect file knowingly
Power surge/over voltage (spike)
Equal error rate (EER)
Data isolation
Trusted source
13. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Retention of business records
Overall organizational structure
Properly aligned with business goals and objectives
Comparison of cost of achievement
14. Needs to define the access rules - which is troublesome and error prone in large organizations.
Process of introducing changes to systems
Spoofing attacks
Countermeasure cost-benefit analysis
Rule-based access control
15. S small warehouse - designed for the end-user needs in a strategic business unit
Cracker
Data mart
Risk appetite
Proficiency testing
16. Computer that has duplicate components so it can continue to operate when one of its main components fail
Vulnerability assessment
Fault-tolerant computer
Control effectiveness
Data owners
17. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Calculating the value of the information or asset
Comparison of cost of achievement
SWOT analysis
Deeper level of analysis
18. Used to understand the flow of one process into another.
The information security officer
Support the business objectives of the organization
Data mart
Waterfall chart
19. Whenever personal data are transferred across national boundaries; ________________________ are required.
Waterfall chart
Phishing
The awareness and agreement of the data subjects
Continuous monitoring control initiatives
20. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Identify the vulnerable systems and apply compensating controls
The awareness and agreement of the data subjects
Owner of the information asset
Regular review of access control lists
21. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Role-based policy
Security risk
Biometric access control systems
Safeguards over keys
22. Only valid if assets have first been identified and appropriately valued.
Two-factor authentication
Annual loss expectancy (ALE)calculations
Continuous analysis - monitoring and feedback
Requirements of the data owners
23. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Cyber extortionist
Vulnerability assessment
All personnel
Overall organizational structure
24. Occurs when the electrical supply drops
Undervoltage (brownout)
The data custodian
Information contained on the equipment
IP address packet filtering
25. Reducing risk to a level too small to measure is _______________.
Spoofing attacks
Breakeven point of risk reduction and cost
Continuous analysis - monitoring and feedback
Impractical and is often cost-prohibitive
26. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Service level agreements (SLAs)
Intrusion detection system (IDS)
Alignment with business strategy
Proficiency testing
27. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Deeper level of analysis
Security code reviews for the entire software application
Encryption of the hard disks
People
28. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Is willing to accept
Two-factor authentication
Worm
Asset classification
29. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Security risk
Identify the relevant systems and processes
Cracker
Script kiddie
30. Carries out the technical administration.
Regulatory compliance
Cyber terrorist
The database administrator
The awareness and agreement of the data subjects
31. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Equal error rate (EER)
Internal risk assessment
Key controls
Normalization
32. The MOST important element of an information security strategy.
Virus detection
Defined objectives
Phishing
Strategic alignment of security with business objectives
33. Has full responsibility over data.
Cyber extortionist
Security baselines
Hacker
The data owner
34. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Prioritization
Security code reviews for the entire software application
Protective switch covers
Power surge/over voltage (spike)
35. provides the most effective protection of data on mobile devices.
Encryption
Is willing to accept
Power surge/over voltage (spike)
Cracker
36. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Do with the information it collects
The data custodian
Script kiddie
The board of directors and senior management
37. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Virus detection
Malicious software and spyware
Decentralization
Negotiating a local version of the organization standards
38. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Intrusion detection system (IDS)
Virus
Acceptable use policies
Exceptions to policy
39. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Risk assessment - evaluation and impact analysis
Internal risk assessment
Developing an information security baseline
Digital certificate
40. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Virus
Detection defenses
Retention of business records
What happened and how the breach was resolved
41. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
BIA (Business Impact Assessment
Logon banners
Single sign-on (SSO) product
Power surge/over voltage (spike)
42. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Baseline standard and then develop additional standards
Tie security risks to key business objectives
Exceptions to policy
Control risk
43. Utility program that detects and protects a personal computer from unauthorized intrusions
Certificate authority (CA)
Data classification
Personal firewall
Creation of a business continuity plan
44. An information security manager has to impress upon the human resources department the need for _____________________.
Security awareness training for all employees
Virus detection
Security code reviews for the entire software application
Get senior management onboard
45. Ensure that transmitted information can be attributed to the named sender.
Digital signatures
Use of security metrics
Patch management
Get senior management onboard
46. Identification and _______________ of business risk enables project managers to address areas with most significance.
Resource dependency assessment
Methodology used in the assessment
Trusted source
Prioritization
47. A method for analyzing and reducing a relational database to its most streamlined form
Data classification
Compliance with the organization's information security requirements
Residual risk would be reduced by a greater amount
Normalization
48. A function of the session keys distributed by the PKI.
All personnel
Stress testing
Cross-site scripting attacks
Confidentiality
49. The data owner is responsible for _______________________.
Transferred risk
Use of security metrics
Equal error rate (EER)
Applying the proper classification to the data
50. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Retention of business records
Tailgating
Prioritization
Comparison of cost of achievement