SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Acceptable use policies
Phishing
Identify the vulnerable systems and apply compensating controls
Rule-based access control
2. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Decentralization
Multinational organization
Owner of the information asset
3. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
The balanced scorecard
Background checks of prospective employees
Baseline standard and then develop additional standards
Spoofing attacks
4. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Control risk
Decentralization
Asset classification
Rule-based access control
5. It is more efficient to establish a ___________________for locations that must meet specific requirements.
SWOT analysis
Personal firewall
Baseline standard and then develop additional standards
Countermeasure cost-benefit analysis
6. New security ulnerabilities should be managed through a ________________.
Transferred risk
Continuous analysis - monitoring and feedback
Patch management process
Cross-site scripting attacks
7. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Encryption key management
Classification of assets needs
Annually or whenever there is a significant change
Strategic alignment of security with business objectives
8. Occurs when the electrical supply drops
Stress testing
The authentication process is broken
Total cost of ownership (TCO)
Undervoltage (brownout)
9. The MOST important element of an information security strategy.
Cyber extortionist
Malicious software and spyware
Defined objectives
Data owners
10. The primary role of the information security manager in the process of information classification within the organization.
Decentralization
Defining and ratifying the classification structure of information assets
Transmit e-mail messages
Internal risk assessment
11. An information security manager has to impress upon the human resources department the need for _____________________.
Role-based policy
Security awareness training for all employees
0-day vulnerabilities
Stress testing
12. Program that hides within or looks like a legit program
Trojan horse
Its ability to reduce or eliminate business risks
Applying the proper classification to the data
Defining and ratifying the classification structure of information assets
13. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Skills inventory
Malicious software and spyware
Biometric access control systems
Total cost of ownership (TCO)
14. Same intent as a cracker but does not have the technical skills and knowledge
Support the business objectives of the organization
Script kiddie
Tie security risks to key business objectives
Detection defenses
15. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Continuous monitoring control initiatives
Do with the information it collects
Impractical and is often cost-prohibitive
All personnel
16. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Prioritization
Alignment with business strategy
The board of directors and senior management
Spoofing attacks
17. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
SWOT analysis
Virus
Certificate authority (CA)
Continuous monitoring control initiatives
18. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Encryption of the hard disks
Security risk
Security code reviews for the entire software application
Comparison of cost of achievement
19. Occurs after the risk assessment process - it does not measure it.
Breakeven point of risk reduction and cost
Use of security metrics
Process of introducing changes to systems
Script kiddie
20. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Reduce risk to an acceptable level
Digital signatures
Performing a risk assessment
Lack of change management
21. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Identify the relevant systems and processes
Continuous monitoring control initiatives
Continuous analysis - monitoring and feedback
Performing a risk assessment
22. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Personal firewall
Risk assessment - evaluation and impact analysis
The data owner
Defined objectives
23. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Penetration testing
Exceptions to policy
The balanced scorecard
Safeguards over keys
24. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
The data owner
Notifications and opt-out provisions
Reduce risk to an acceptable level
Decentralization
25. Provides strong online authentication.
Deeper level of analysis
Public key infrastructure (PKI)
Intrusion detection system (IDS)
Rule-based access control
26. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
27. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Worm
Control risk
Audit objectives
Certificate authority (CA)
28. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Calculating the value of the information or asset
Security risk
Power surge/over voltage (spike)
Internal risk assessment
29. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Data warehouse
Encryption of the hard disks
Access control matrix
Logon banners
30. The data owner is responsible for _______________________.
Audit objectives
Confidentiality
Annually or whenever there is a significant change
Applying the proper classification to the data
31. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
32. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
The information security officer
Reduce risk to an acceptable level
Access control matrix
Safeguards over keys
33. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Centralization of information security management
Owner of the information asset
Role-based access control
Classification of assets needs
34. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Applying the proper classification to the data
Normalization
Properly aligned with business goals and objectives
Confidentiality
35. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
SWOT analysis
Security risk
Total cost of ownership (TCO)
Cryptographic secure sockets layer (SSL) implementations and short key lengths
36. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Support the business objectives of the organization
The awareness and agreement of the data subjects
Methodology used in the assessment
Alignment with business strategy
37. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Developing an information security baseline
Platform security - intrusion detection and antivirus controls
Data classification
Alignment with business strategy
38. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Malicious software and spyware
Increase business value and confidence
The board of directors and senior management
Residual risk would be reduced by a greater amount
39. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Skills inventory
Is willing to accept
The balanced scorecard
Regular review of access control lists
40. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Its ability to reduce or eliminate business risks
OBusiness case development
Patch management
Risk management and the requirements of the organization
41. Focuses on identifying vulnerabilities.
Cost of control
Hacker
Penetration testing
Risk appetite
42. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Equal error rate (EER)
Nondisclosure agreement (NDA)
The information security officer
Logon banners
43. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Get senior management onboard
Role-based access control
Negotiating a local version of the organization standards
Malicious software and spyware
44. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
BIA (Business Impact Assessment
Single sign-on (SSO) product
Acceptable use policies
The data owner
45. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Inherent risk
Asset classification
A network vulnerability assessment
Properly aligned with business goals and objectives
46. Should be performed to identify the risk and determine needed controls.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Encryption key management
Owner of the information asset
Internal risk assessment
47. Awareness - training and physical security defenses.
Patch management process
Safeguards over keys
Examples of containment defenses
Fault-tolerant computer
48. Would protect against spoofing an internal address but would not provide strong authentication.
IP address packet filtering
Encryption of the hard disks
Detection defenses
Public key infrastructure (PKI)
49. A function of the session keys distributed by the PKI.
What happened and how the breach was resolved
Access control matrix
The database administrator
Confidentiality
50. Information security governance models are highly dependent on the _____________________.
Proficiency testing
Information security manager
Overall organizational structure
Prioritization