SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Whenever personal data are transferred across national boundaries; ________________________ are required.
Two-factor authentication
The awareness and agreement of the data subjects
Waterfall chart
Assess the risks to the business operation
2. In order to highlight to management the importance of network security - the security manager should FIRST _______________.
Conduct a risk assessment
Hacker
Security awareness training for all employees
Countermeasure cost-benefit analysis
3. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Worm
Resource dependency assessment
Single sign-on (SSO) product
Cryptographic secure sockets layer (SSL) implementations and short key lengths
4. When defining the information classification policy - the ___________________ need to be identified.
Fault-tolerant computer
Waterfall chart
IP address packet filtering
Requirements of the data owners
5. The best measure for preventing the unauthorized disclosure of confidential information.
Properly aligned with business goals and objectives
Applying the proper classification to the data
Acceptable use policies
Multinational organization
6. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
The information security officer
Security risk
Total cost of ownership (TCO)
Rule-based access control
7. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Identify the relevant systems and processes
Digital signatures
Control risk
Residual risk would be reduced by a greater amount
8. Has full responsibility over data.
Calculating the value of the information or asset
Methodology used in the assessment
Baseline standard and then develop additional standards
The data owner
9. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
BIA (Business Impact Assessment
Cyber terrorist
Decentralization
Identify the vulnerable systems and apply compensating controls
10. Should be performed to identify the risk and determine needed controls.
Encryption key management
Internal risk assessment
Owner of the information asset
Proficiency testing
11. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Comparison of cost of achievement
MAL wear
Owner of the information asset
A network vulnerability assessment
12. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Transmit e-mail messages
Centralization of information security management
Penetration testing
Access control matrix
13. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Impractical and is often cost-prohibitive
Biometric access control systems
Skills inventory
Data warehouse
14. Identification and _______________ of business risk enables project managers to address areas with most significance.
Inherent risk
Prioritization
Data isolation
Data warehouse
15. The PRIMARY goal in developing an information security strategy is to: _________________________.
Gain unauthorized access to applications
Support the business objectives of the organization
Acceptable use policies
Cryptographic secure sockets layer (SSL) implementations and short key lengths
16. Has to be integrated into the requirements of every software application's design.
OBusiness case development
Encryption key management
Cracker
Internal risk assessment
17. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Properly aligned with business goals and objectives
What happened and how the breach was resolved
Equal error rate (EER)
Service level agreements (SLAs)
18. ecurity design flaws require a ____________________.
Deeper level of analysis
Aligned with organizational goals
Resource dependency assessment
Cryptographic secure sockets layer (SSL) implementations and short key lengths
19. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. Oversees the overall classification management of the information.
Equal error rate (EER)
The information security officer
Detection defenses
Prioritization
21. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Use of security metrics
The board of directors and senior management
Trusted source
Return on security investment (ROSI)
22. Accesses a computer or network illegally
Aligned with organizational goals
Cracker
All personnel
Decentralization
23. The MOST important element of an information security strategy.
Defined objectives
Well-defined roles and responsibilities
Deeper level of analysis
Notifications and opt-out provisions
24. Responsible for securing the information.
The data custodian
Penetration testing
People
Digital signatures
25. provides the most effective protection of data on mobile devices.
Protective switch covers
Encryption
Regular review of access control lists
Malicious software and spyware
26. Should PRIMARILY be based on regulatory and legal requirements.
Retention of business records
Data isolation
Skills inventory
Vulnerability assessment
27. Should be determined from the risk assessment results.
A network vulnerability assessment
Audit objectives
Attributes and characteristics of the 'desired state'
BIA (Business Impact Assessment
28. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
People
Identify the vulnerable systems and apply compensating controls
Two-factor authentication
Control risk
29. A method for analyzing and reducing a relational database to its most streamlined form
The board of directors and senior management
Normalization
Aligned with organizational goals
Properly aligned with business goals and objectives
30. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Calculating the value of the information or asset
The data owner
Risk appetite
Public key infrastructure (PKI)
31. Ensures that there are no scalability problems.
Aligned with organizational goals
BIA (Business Impact Assessment
Stress testing
Detection defenses
32. It is easier to manage and control a _________________.
Data mart
A network vulnerability assessment
Centralized structure
Virus detection
33. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
SWOT analysis
IP address packet filtering
Encryption of the hard disks
Threat assessment
34. Company or person you believe will not send a virus-infect file knowingly
Trusted source
SWOT analysis
Logon banners
Key controls
35. The primary role of the information security manager in the process of information classification within the organization.
Stress testing
Information contained on the equipment
Defining and ratifying the classification structure of information assets
Equal error rate (EER)
36. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Equal error rate (EER)
Single sign-on (SSO) product
include security responsibilities in a job description
People
37. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Gain unauthorized access to applications
Access control matrix
Tie security risks to key business objectives
Do with the information it collects
38. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Confidentiality
Detection defenses
Calculating the value of the information or asset
Virus
39. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Monitoring processes
include security responsibilities in a job description
Platform security - intrusion detection and antivirus controls
0-day vulnerabilities
40. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Undervoltage (brownout)
Get senior management onboard
Certificate authority (CA)
Security awareness training for all employees
41. Computer that has duplicate components so it can continue to operate when one of its main components fail
Continuous analysis - monitoring and feedback
Fault-tolerant computer
Role-based policy
Use of security metrics
42. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Strategic alignment of security with business objectives
Knowledge management
Data owners
MAL wear
43. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Identify the relevant systems and processes
Information contained on the equipment
Alignment with business strategy
Cross-site scripting attacks
44. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
All personnel
Trusted source
include security responsibilities in a job description
Risk assessment - evaluation and impact analysis
45. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Role-based access control
Knowledge management
Conduct a risk assessment
Calculating the value of the information or asset
46. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Resource dependency assessment
Information security manager
Data warehouse
Cyber extortionist
47. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Data classification
Negotiating a local version of the organization standards
Control risk
Data warehouse
48. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Role-based policy
What happened and how the breach was resolved
Vulnerability assessment
All personnel
49. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Encryption of the hard disks
Requirements of the data owners
Control risk
Alignment with business strategy
50. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Safeguards over keys
The information security officer
Use of security metrics
Background checks of prospective employees