SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Background checks of prospective employees
Annually or whenever there is a significant change
Proficiency testing
Patch management process
2. When the ________________ is more than the cost of the risk - the risk should be accepted.
Data classification
Cost of control
Identify the relevant systems and processes
Protective switch covers
3. provides the most effective protection of data on mobile devices.
Encryption
Threat assessment
Regulatory compliance
Worm
4. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Regular review of access control lists
Logon banners
Safeguards over keys
Waterfall chart
5. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Compliance with the organization's information security requirements
Waterfall chart
Comparison of cost of achievement
Nondisclosure agreement (NDA)
6. Has to be integrated into the requirements of every software application's design.
Biometric access control systems
Safeguards over keys
Data mart
Encryption key management
7. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Alignment with business strategy
Examples of containment defenses
Negotiating a local version of the organization standards
Performing a risk assessment
8. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Classification of assets needs
Encryption key management
Properly aligned with business goals and objectives
A network vulnerability assessment
9. The PRIMARY goal in developing an information security strategy is to: _________________________.
Single sign-on (SSO) product
Support the business objectives of the organization
Centralized structure
Developing an information security baseline
10. Focuses on identifying vulnerabilities.
Digital signatures
Penetration testing
Residual risk
Stress testing
11. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. A method for analyzing and reducing a relational database to its most streamlined form
Fault-tolerant computer
Penetration testing
Normalization
Logon banners
13. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Platform security - intrusion detection and antivirus controls
Consensus on risks and controls
Logon banners
Background checks of prospective employees
14. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Well-defined roles and responsibilities
Alignment with business strategy
Gain unauthorized access to applications
The data owner
15. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Fault-tolerant computer
Consensus on risks and controls
Reduce risk to an acceptable level
Countermeasure cost-benefit analysis
16. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Decentralization
Nondisclosure agreement (NDA)
Logon banners
Safeguards over keys
17. The best measure for preventing the unauthorized disclosure of confidential information.
Exceptions to policy
IP address packet filtering
Regular review of access control lists
Acceptable use policies
18. Ensure that transmitted information can be attributed to the named sender.
Tie security risks to key business objectives
Transferred risk
Certificate authority (CA)
Digital signatures
19. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Alignment with business strategy
Tie security risks to key business objectives
Comparison of cost of achievement
Proficiency testing
20. By definition are not previously known and therefore are undetectable.
Patch management process
Skills inventory
Breakeven point of risk reduction and cost
0-day vulnerabilities
21. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Safeguards over keys
Certificate authority (CA)
Public key infrastructure (PKI)
Developing an information security baseline
22. Occurs when the electrical supply drops
Countermeasure cost-benefit analysis
Continuous monitoring control initiatives
Undervoltage (brownout)
IP address packet filtering
23. Same intent as a cracker but does not have the technical skills and knowledge
Prioritization
Retention of business records
Classification of assets needs
Script kiddie
24. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Get senior management onboard
Transmit e-mail messages
Increase business value and confidence
Acceptable use policies
25. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Notifications and opt-out provisions
Monitoring processes
What happened and how the breach was resolved
People
26. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
The authentication process is broken
Encryption of the hard disks
Script kiddie
Risk management and the requirements of the organization
27. A key indicator of performance measurement.
Security risk
Skills inventory
Strategic alignment of security with business objectives
Vulnerability assessment
28. Company or person you believe will not send a virus-infect file knowingly
Script kiddie
Increase business value and confidence
Trusted source
Phishing
29. A notice that guarantees a user or a web site is legitimate
Defining and ratifying the classification structure of information assets
Defined objectives
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Digital certificate
30. Risk should be reduced to a level that an organization _____________.
Is willing to accept
Nondisclosure agreement (NDA)
Platform security - intrusion detection and antivirus controls
Hacker
31. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Cyber extortionist
Logon banners
Biometric access control systems
Asset classification
32. ecurity design flaws require a ____________________.
Deeper level of analysis
Asset classification
Hacker
Owner of the information asset
33. Utility program that detects and protects a personal computer from unauthorized intrusions
Personal firewall
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Digital signatures
Get senior management onboard
34. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Identify the relevant systems and processes
What happened and how the breach was resolved
Return on security investment (ROSI)
include security responsibilities in a job description
35. Most effective for evaluating the degree to which information security objectives are being met.
Patch management
The balanced scorecard
Annual loss expectancy (ALE)calculations
Performing a risk assessment
36. A repository of historical data organized by subject to support decision makers in the org
Data owners
Data warehouse
Cyber extortionist
Risk appetite
37. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Prioritization
Tie security risks to key business objectives
Data warehouse
Undervoltage (brownout)
38. Needs to define the access rules - which is troublesome and error prone in large organizations.
Rule-based access control
Control effectiveness
Monitoring processes
Security baselines
39. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Undervoltage (brownout)
Multinational organization
Intrusion detection system (IDS)
Nondisclosure agreement (NDA)
40. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Transferred risk
Encryption of the hard disks
Lack of change management
Baseline standard and then develop additional standards
41. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Centralization of information security management
Cross-site scripting attacks
Trojan horse
Its ability to reduce or eliminate business risks
42. New security ulnerabilities should be managed through a ________________.
Regulatory compliance
Creation of a business continuity plan
Patch management process
Consensus on risks and controls
43. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Detection defenses
Skills inventory
Transferred risk
Background check
44. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Overall organizational structure
Control risk
Regulatory compliance
Performing a risk assessment
45. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Protective switch covers
Multinational organization
Stress testing
Cracker
46. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
The information security officer
Total cost of ownership (TCO)
Service level agreements (SLAs)
Control effectiveness
47. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Continuous monitoring control initiatives
Security code reviews for the entire software application
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Regulatory compliance
48. Should PRIMARILY be based on regulatory and legal requirements.
Negotiating a local version of the organization standards
Centralized structure
Retention of business records
Control effectiveness
49. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Owner of the information asset
Multinational organization
Its ability to reduce or eliminate business risks
Baseline standard and then develop additional standards
50. The job of the information security officer on a management team is to ___________________.
Negotiating a local version of the organization standards
Cross-site scripting attacks
Assess the risks to the business operation
Retention of business records