SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Responsible for securing the information.
The data custodian
Script kiddie
Safeguards over keys
MAL wear
2. Has full responsibility over data.
The data custodian
The data owner
Proficiency testing
Monitoring processes
3. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
The board of directors and senior management
Platform security - intrusion detection and antivirus controls
All personnel
Exceptions to policy
4. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Information contained on the equipment
Defining high-level business security requirements
Properly aligned with business goals and objectives
Security awareness training for all employees
5. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Monitoring processes
Nondisclosure agreement (NDA)
Cost of control
Regular review of access control lists
6. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Creation of a business continuity plan
A network vulnerability assessment
Resource dependency assessment
Negotiating a local version of the organization standards
7. Risk should be reduced to a level that an organization _____________.
Is willing to accept
Gain unauthorized access to applications
Reduce risk to an acceptable level
Do with the information it collects
8. When the ________________ is more than the cost of the risk - the risk should be accepted.
Cost of control
Calculating the value of the information or asset
Gap analysis
Support the business objectives of the organization
9. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Decentralization
Creation of a business continuity plan
Assess the risks to the business operation
Negotiating a local version of the organization standards
10. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Virus
Patch management
Data warehouse
Protective switch covers
11. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Identify the relevant systems and processes
Breakeven point of risk reduction and cost
Security risk
Access control matrix
12. ecurity design flaws require a ____________________.
Proficiency testing
Role-based policy
Deeper level of analysis
Performing a risk assessment
13. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Compliance with the organization's information security requirements
Worm
Digital signatures
Resource dependency assessment
14. The information security manager needs to prioritize the controls based on ________________________.
Equal error rate (EER)
Two-factor authentication
Annually or whenever there is a significant change
Risk management and the requirements of the organization
15. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
What happened and how the breach was resolved
Digital signatures
Well-defined roles and responsibilities
Control risk
16. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
A network vulnerability assessment
Overall organizational structure
Developing an information security baseline
Lack of change management
17. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Confidentiality
Key risk indicator (KRI) setup
Inherent risk
Lack of change management
18. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Proficiency testing
Properly aligned with business goals and objectives
Calculating the value of the information or asset
People
19. Should be a standard requirement for the service provider.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Baseline standard and then develop additional standards
A network vulnerability assessment
Background check
20. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Public key infrastructure (PKI)
Background checks of prospective employees
Biometric access control systems
Service level agreements (SLAs)
21. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Acceptable use policies
Get senior management onboard
Annual loss expectancy (ALE)calculations
Script kiddie
22. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Equal error rate (EER)
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Gain unauthorized access to applications
Prioritization
23. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
Virus
Data classification
Comparison of cost of achievement
SWOT analysis
24. BEST option to improve accountability for a system administrator is to _____________________.
OBusiness case development
include security responsibilities in a job description
Cyber extortionist
Regular review of access control lists
25. Provide metrics to which outsourcing firms can be held accountable.
Service level agreements (SLAs)
Support the business objectives of the organization
Phishing
Applying the proper classification to the data
26. Uses security metrics to measure the performance of the information security program.
Audit objectives
Information security manager
Regulatory compliance
Continuous monitoring control initiatives
27. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Patch management
Consensus on risks and controls
Vulnerability assessment
Role-based access control
28. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Defined objectives
Gain unauthorized access to applications
Spoofing attacks
Skills inventory
29. The most important characteristic of good security policies is that they be ____________________.
Retention of business records
Aligned with organizational goals
Certificate authority (CA)
Regulatory compliance
30. To identify known vulnerabilities based on common misconfigurations and missing updates.
A network vulnerability assessment
Process of introducing changes to systems
Deeper level of analysis
Comparison of cost of achievement
31. The primary role of the information security manager in the process of information classification within the organization.
Defining and ratifying the classification structure of information assets
Its ability to reduce or eliminate business risks
Normalization
Countermeasure cost-benefit analysis
32. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Phishing
Notifications and opt-out provisions
Annually or whenever there is a significant change
Prioritization
33. Someone who uses the internet or network to destroy or damage computers for political reasons
Cyber terrorist
Service level agreements (SLAs)
Skills inventory
Methodology used in the assessment
34. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Exceptions to policy
Transferred risk
SWOT analysis
Consensus on risks and controls
35. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Cyber extortionist
Patch management process
Acceptable use policies
include security responsibilities in a job description
36. It is easier to manage and control a _________________.
Logon banners
Fault-tolerant computer
Spoofing attacks
Centralized structure
37. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Regulatory compliance
Key risk indicator (KRI) setup
Resource dependency assessment
Calculating the value of the information or asset
38. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Do with the information it collects
Acceptable use policies
Monitoring processes
Undervoltage (brownout)
39. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
All personnel
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Methodology used in the assessment
Data mart
40. Information security governance models are highly dependent on the _____________________.
Inherent risk
Overall organizational structure
IP address packet filtering
Rule-based access control
41. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Process of introducing changes to systems
IP address packet filtering
Continuous analysis - monitoring and feedback
The database administrator
42. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Platform security - intrusion detection and antivirus controls
Its ability to reduce or eliminate business risks
Key risk indicator (KRI) setup
Tailgating
43. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Identify the vulnerable systems and apply compensating controls
Data classification
Cracker
Normalization
44. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Personal firewall
Single sign-on (SSO) product
Patch management process
Residual risk
45. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
A network vulnerability assessment
Safeguards over keys
Exceptions to policy
Data owners
46. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Attributes and characteristics of the 'desired state'
Transmit e-mail messages
Residual risk would be reduced by a greater amount
BIA (Business Impact Assessment
47. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Cracker
Residual risk
SWOT analysis
Classification of assets needs
48. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
The authentication process is broken
Risk assessment - evaluation and impact analysis
Return on security investment (ROSI)
Platform security - intrusion detection and antivirus controls
49. Awareness - training and physical security defenses.
Gap analysis
The database administrator
Examples of containment defenses
Strategic alignment of security with business objectives
50. Normally addressed through antivirus and antispyware policies.
Increase business value and confidence
Examples of containment defenses
Worm
Malicious software and spyware