SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Tie security risks to key business objectives
Malicious software and spyware
People
Classification of assets needs
2. Program that hides within or looks like a legit program
Spoofing attacks
Waterfall chart
Data isolation
Trojan horse
3. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
All personnel
Control effectiveness
Data owners
Is willing to accept
4. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Data owners
Risk appetite
Gain unauthorized access to applications
Virus detection
5. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Proficiency testing
Security risk
Requirements of the data owners
Reduce risk to an acceptable level
6. Information security governance models are highly dependent on the _____________________.
BIA (Business Impact Assessment
Prioritization
Overall organizational structure
Public key infrastructure (PKI)
7. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Data mart
Trojan horse
Baseline standard and then develop additional standards
Is willing to accept
8. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Process of introducing changes to systems
Tie security risks to key business objectives
Two-factor authentication
Gap analysis
9. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Asset classification
Risk appetite
Resource dependency assessment
Risk management and the requirements of the organization
10. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Resource dependency assessment
Use of security metrics
Control risk
Increase business value and confidence
11. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
Impractical and is often cost-prohibitive
All personnel
Is willing to accept
Detection defenses
12. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Support the business objectives of the organization
Exceptions to policy
Safeguards over keys
Developing an information security baseline
13. S small warehouse - designed for the end-user needs in a strategic business unit
Inherent risk
Data classification
Identify the vulnerable systems and apply compensating controls
Data mart
14. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
The awareness and agreement of the data subjects
Increase business value and confidence
Personal firewall
Owner of the information asset
15. Used to understand the flow of one process into another.
Data owners
Patch management process
Transmit e-mail messages
Waterfall chart
16. Should be determined from the risk assessment results.
Identify the vulnerable systems and apply compensating controls
Centralization of information security management
Audit objectives
Process of introducing changes to systems
17. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Patch management
Detection defenses
Notifications and opt-out provisions
Annual loss expectancy (ALE)calculations
18. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Encryption
Continuous analysis - monitoring and feedback
Equal error rate (EER)
Confidentiality
19. The primary role of the information security manager in the process of information classification within the organization.
Properly aligned with business goals and objectives
Key risk indicator (KRI) setup
Defining and ratifying the classification structure of information assets
Multinational organization
20. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Resource dependency assessment
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Regulatory compliance
Spoofing attacks
21. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Support the business objectives of the organization
Return on security investment (ROSI)
The awareness and agreement of the data subjects
Performing a risk assessment
22. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
The balanced scorecard
Regulatory compliance
Return on security investment (ROSI)
Digital signatures
23. Without _____________________ - there cannot be accountability.
Skills inventory
Acceptable use policies
Process of introducing changes to systems
Well-defined roles and responsibilities
24. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Cyber terrorist
Single sign-on (SSO) product
Security baselines
The information security officer
25. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Multinational organization
Data warehouse
Continuous monitoring control initiatives
Data classification
26. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Prioritization
Lack of change management
Annually or whenever there is a significant change
Comparison of cost of achievement
27. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Aligned with organizational goals
Owner of the information asset
Confidentiality
Detection defenses
28. An information security manager has to impress upon the human resources department the need for _____________________.
Threat assessment
Well-defined roles and responsibilities
Do with the information it collects
Security awareness training for all employees
29. Oversees the overall classification management of the information.
Worm
Key risk indicator (KRI) setup
The information security officer
Prioritization
30. Provides strong online authentication.
Audit objectives
Centralized structure
Safeguards over keys
Public key infrastructure (PKI)
31. Accesses a computer or network illegally
Cracker
Data owners
Continuous analysis - monitoring and feedback
Baseline standard and then develop additional standards
32. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Multinational organization
Transmit e-mail messages
Vulnerability assessment
Confidentiality
33. Occurs when the electrical supply drops
Waterfall chart
Undervoltage (brownout)
Continuous analysis - monitoring and feedback
Data isolation
34. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Prioritization
Encryption
Virus
The board of directors and senior management
36. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Do with the information it collects
Data mart
OBusiness case development
Data warehouse
37. Carries out the technical administration.
Conduct a risk assessment
The database administrator
The data owner
Negotiating a local version of the organization standards
38. The best measure for preventing the unauthorized disclosure of confidential information.
Acceptable use policies
Virus detection
Continuous analysis - monitoring and feedback
Cost of control
39. Occurs after the risk assessment process - it does not measure it.
Use of security metrics
Data isolation
Owner of the information asset
Strategic alignment of security with business objectives
40. Reducing risk to a level too small to measure is _______________.
Gap analysis
Impractical and is often cost-prohibitive
Worm
Hacker
41. Someone who uses the internet or network to destroy or damage computers for political reasons
Power surge/over voltage (spike)
Negotiating a local version of the organization standards
Cyber terrorist
Normalization
42. Would protect against spoofing an internal address but would not provide strong authentication.
Phishing
Get senior management onboard
Inherent risk
IP address packet filtering
43. A Successful risk management should lead to a ________________.
Access control matrix
Trusted source
Lack of change management
Breakeven point of risk reduction and cost
44. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Security baselines
The authentication process is broken
Data warehouse
Background checks of prospective employees
45. Company or person you believe will not send a virus-infect file knowingly
Trusted source
Continuous analysis - monitoring and feedback
BIA (Business Impact Assessment
Centralized structure
46. Applications cannot access data associated with other apps
Internal risk assessment
Data isolation
Impractical and is often cost-prohibitive
Gain unauthorized access to applications
47. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Malicious software and spyware
Exceptions to policy
Script kiddie
Biometric access control systems
48. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Risk assessment - evaluation and impact analysis
Tailgating
Certificate authority (CA)
Annually or whenever there is a significant change
49. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Cracker
Service level agreements (SLAs)
Role-based policy
Phishing
50. Awareness - training and physical security defenses.
Continuous analysis - monitoring and feedback
Lack of change management
Examples of containment defenses
Audit objectives
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests