SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Stress testing
BIA (Business Impact Assessment
Digital signatures
Breakeven point of risk reduction and cost
2. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Security code reviews for the entire software application
Gain unauthorized access to applications
SWOT analysis
OBusiness case development
3. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Certificate authority (CA)
Acceptable use policies
Safeguards over keys
Impractical and is often cost-prohibitive
4. Most effective for evaluating the degree to which information security objectives are being met.
Return on security investment (ROSI)
The balanced scorecard
Script kiddie
Support the business objectives of the organization
5. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Performing a risk assessment
Prioritization
Centralization of information security management
Cyber extortionist
6. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Annually or whenever there is a significant change
The information security officer
Centralized structure
Regulatory compliance
7. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Cyber extortionist
Security risk
Data classification
Certificate authority (CA)
8. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Use of security metrics
Role-based access control
Encryption of the hard disks
Worm
9. Occurs when the incoming level
Malicious software and spyware
Security baselines
Power surge/over voltage (spike)
Equal error rate (EER)
10. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
MAL wear
Data classification
SWOT analysis
Cryptographic secure sockets layer (SSL) implementations and short key lengths
11. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
People
Data warehouse
Properly aligned with business goals and objectives
Background check
12. A Successful risk management should lead to a ________________.
Breakeven point of risk reduction and cost
Monitoring processes
IP address packet filtering
Vulnerability assessment
13. It is easier to manage and control a _________________.
Centralized structure
Impractical and is often cost-prohibitive
Retention of business records
Tie security risks to key business objectives
14. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Exceptions to policy
Defining and ratifying the classification structure of information assets
Support the business objectives of the organization
Cracker
15. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Conduct a risk assessment
Vulnerability assessment
Platform security - intrusion detection and antivirus controls
16. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Centralization of information security management
Patch management process
Developing an information security baseline
OBusiness case development
17. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Background checks of prospective employees
Alignment with business strategy
Increase business value and confidence
Conduct a risk assessment
18. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Residual risk would be reduced by a greater amount
Regular review of access control lists
Rule-based access control
The balanced scorecard
19. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
0-day vulnerabilities
Data classification
Impractical and is often cost-prohibitive
Detection defenses
20. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Overall organizational structure
Annually or whenever there is a significant change
Comparison of cost of achievement
Creation of a business continuity plan
21. An information security manager has to impress upon the human resources department the need for _____________________.
Process of introducing changes to systems
Security awareness training for all employees
Compliance with the organization's information security requirements
Retention of business records
22. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Baseline standard and then develop additional standards
Biometric access control systems
What happened and how the breach was resolved
Transferred risk
23. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Its ability to reduce or eliminate business risks
Get senior management onboard
Key risk indicator (KRI) setup
Patch management process
24. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Worm
OBusiness case development
Tie security risks to key business objectives
The board of directors and senior management
25. Provides strong online authentication.
Resource dependency assessment
Information security manager
The awareness and agreement of the data subjects
Public key infrastructure (PKI)
26. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Increase business value and confidence
Retention of business records
Biometric access control systems
Risk appetite
27. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Trusted source
Defining and ratifying the classification structure of information assets
Equal error rate (EER)
Lack of change management
28. When the ________________ is more than the cost of the risk - the risk should be accepted.
Baseline standard and then develop additional standards
Cost of control
All personnel
Tie security risks to key business objectives
29. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Baseline standard and then develop additional standards
Transferred risk
Asset classification
Virus detection
30. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Identify the relevant systems and processes
MAL wear
Skills inventory
0-day vulnerabilities
31. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Patch management process
Background checks of prospective employees
Security awareness training for all employees
Platform security - intrusion detection and antivirus controls
32. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
0-day vulnerabilities
All personnel
Knowledge management
Support the business objectives of the organization
33. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Consensus on risks and controls
Defining and ratifying the classification structure of information assets
Defined objectives
Identify the vulnerable systems and apply compensating controls
34. The MOST important element of an information security strategy.
Developing an information security baseline
Security risk
Defined objectives
Information contained on the equipment
35. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Patch management
Tailgating
Security risk
Breakeven point of risk reduction and cost
36. Utility program that detects and protects a personal computer from unauthorized intrusions
Data owners
Internal risk assessment
Personal firewall
Script kiddie
37. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Cracker
Confidentiality
Continuous analysis - monitoring and feedback
Lack of change management
38. Without _____________________ - there cannot be accountability.
Data isolation
Well-defined roles and responsibilities
Gain unauthorized access to applications
Its ability to reduce or eliminate business risks
39. Used to understand the flow of one process into another.
Waterfall chart
Compliance with the organization's information security requirements
Fault-tolerant computer
Well-defined roles and responsibilities
40. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Personal firewall
Deeper level of analysis
Risk appetite
Role-based policy
41. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Continuous monitoring control initiatives
Platform security - intrusion detection and antivirus controls
Acceptable use policies
Do with the information it collects
42. Should be performed to identify the risk and determine needed controls.
Patch management process
Strategic alignment of security with business objectives
Control risk
Internal risk assessment
43. Computer that has duplicate components so it can continue to operate when one of its main components fail
Fault-tolerant computer
Stress testing
Virus detection
Multinational organization
44. BEST option to improve accountability for a system administrator is to _____________________.
Risk appetite
Detection defenses
Acceptable use policies
include security responsibilities in a job description
45. Accesses a computer or network illegally
Certificate authority (CA)
Gain unauthorized access to applications
Use of security metrics
Cracker
46. The information security manager needs to prioritize the controls based on ________________________.
Malicious software and spyware
Support the business objectives of the organization
Risk management and the requirements of the organization
Monitoring processes
47. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Worm
Control effectiveness
Threat assessment
Use of security metrics
48. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Threat assessment
Platform security - intrusion detection and antivirus controls
Role-based access control
Vulnerability assessment
49. A notice that guarantees a user or a web site is legitimate
Digital certificate
Strategic alignment of security with business objectives
Phishing
Digital signatures
50. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Stress testing
Reduce risk to an acceptable level
Strategic alignment of security with business objectives
Countermeasure cost-benefit analysis