SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Continuous analysis - monitoring and feedback
Annually or whenever there is a significant change
The data custodian
Is willing to accept
2. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
People
Knowledge management
The authentication process is broken
Tailgating
3. Should be performed to identify the risk and determine needed controls.
Internal risk assessment
IP address packet filtering
Certificate authority (CA)
Calculating the value of the information or asset
4. Focuses on identifying vulnerabilities.
Rule-based access control
Penetration testing
Multinational organization
Return on security investment (ROSI)
5. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. Most effective for evaluating the degree to which information security objectives are being met.
Lack of change management
Cost of control
Encryption
The balanced scorecard
7. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Consensus on risks and controls
Equal error rate (EER)
Background checks of prospective employees
What happened and how the breach was resolved
8. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Normalization
The data custodian
Intrusion detection system (IDS)
include security responsibilities in a job description
9. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Regular review of access control lists
Knowledge management
Breakeven point of risk reduction and cost
Stress testing
10. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Worm
Retention of business records
Service level agreements (SLAs)
Classification of assets needs
11. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
All personnel
Virus detection
Biometric access control systems
Continuous analysis - monitoring and feedback
12. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
People
Notifications and opt-out provisions
Equal error rate (EER)
Creation of a business continuity plan
13. Uses security metrics to measure the performance of the information security program.
Worm
Phishing
Information security manager
Conduct a risk assessment
14. The information security manager needs to prioritize the controls based on ________________________.
Detection defenses
Countermeasure cost-benefit analysis
Risk management and the requirements of the organization
Performing a risk assessment
15. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Control effectiveness
Access control matrix
Acceptable use policies
Information contained on the equipment
16. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Encryption key management
Exceptions to policy
Script kiddie
17. Cannot be minimized
Centralization of information security management
Annually or whenever there is a significant change
Impractical and is often cost-prohibitive
Inherent risk
18. When the ________________ is more than the cost of the risk - the risk should be accepted.
Normalization
Its ability to reduce or eliminate business risks
Applying the proper classification to the data
Cost of control
19. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Certificate authority (CA)
Is willing to accept
Threat assessment
Skills inventory
20. A key indicator of performance measurement.
MAL wear
Strategic alignment of security with business objectives
Deeper level of analysis
Annual loss expectancy (ALE)calculations
21. Occurs when the incoming level
Transferred risk
Power surge/over voltage (spike)
Waterfall chart
MAL wear
22. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
The authentication process is broken
Centralized structure
The board of directors and senior management
Retention of business records
23. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
OBusiness case development
IP address packet filtering
Data mart
Vulnerability assessment
24. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Acceptable use policies
Audit objectives
Lack of change management
Annual loss expectancy (ALE)calculations
25. Carries out the technical administration.
The database administrator
The authentication process is broken
Data classification
Digital certificate
26. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Gap analysis
Transmit e-mail messages
Transferred risk
Residual risk
27. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Notifications and opt-out provisions
Risk assessment - evaluation and impact analysis
Cyber terrorist
Information security manager
28. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Phishing
Security risk
Continuous monitoring control initiatives
Transferred risk
29. A function of the session keys distributed by the PKI.
Nondisclosure agreement (NDA)
Confidentiality
Centralized structure
Key risk indicator (KRI) setup
30. Normally addressed through antivirus and antispyware policies.
Malicious software and spyware
Tie security risks to key business objectives
Risk management and the requirements of the organization
The information security officer
31. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
What happened and how the breach was resolved
Decentralization
Comparison of cost of achievement
Multinational organization
32. Provides process needs but not impact.
Security awareness training for all employees
Virus detection
Classification of assets needs
Resource dependency assessment
33. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Cyber extortionist
Certificate authority (CA)
Prioritization
Threat assessment
34. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Well-defined roles and responsibilities
Encryption of the hard disks
Baseline standard and then develop additional standards
Defining high-level business security requirements
35. Oversees the overall classification management of the information.
Protective switch covers
The information security officer
Reduce risk to an acceptable level
Overall organizational structure
36. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Residual risk would be reduced by a greater amount
Get senior management onboard
Internal risk assessment
Its ability to reduce or eliminate business risks
37. By definition are not previously known and therefore are undetectable.
Prioritization
Strategic alignment of security with business objectives
0-day vulnerabilities
Cost of control
38. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Encryption of the hard disks
The data owner
OBusiness case development
Negotiating a local version of the organization standards
39. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Deeper level of analysis
Creation of a business continuity plan
Script kiddie
Classification of assets needs
40. A Successful risk management should lead to a ________________.
Breakeven point of risk reduction and cost
Cyber terrorist
Audit objectives
The balanced scorecard
41. Provide metrics to which outsourcing firms can be held accountable.
Exceptions to policy
Service level agreements (SLAs)
Knowledge management
Breakeven point of risk reduction and cost
42. ecurity design flaws require a ____________________.
Deeper level of analysis
Negotiating a local version of the organization standards
Its ability to reduce or eliminate business risks
People
43. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Alignment with business strategy
Residual risk
Asset classification
Annually or whenever there is a significant change
44. A notice that guarantees a user or a web site is legitimate
What happened and how the breach was resolved
Strategic alignment of security with business objectives
Digital certificate
Two-factor authentication
45. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Regulatory compliance
Annual loss expectancy (ALE)calculations
Performing a risk assessment
Single sign-on (SSO) product
46. It is easier to manage and control a _________________.
Risk assessment - evaluation and impact analysis
Stress testing
Centralized structure
Undervoltage (brownout)
47. To identify known vulnerabilities based on common misconfigurations and missing updates.
A network vulnerability assessment
Background check
Aligned with organizational goals
Cyber terrorist
48. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Tie security risks to key business objectives
Detection defenses
Skills inventory
Breakeven point of risk reduction and cost
49. Provides strong online authentication.
Public key infrastructure (PKI)
Detection defenses
Baseline standard and then develop additional standards
Worm
50. Without _____________________ - there cannot be accountability.
Examples of containment defenses
Service level agreements (SLAs)
Audit objectives
Well-defined roles and responsibilities
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests