SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Cost of control
Do with the information it collects
BIA (Business Impact Assessment
Fault-tolerant computer
2. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Reduce risk to an acceptable level
Retention of business records
The board of directors and senior management
Internal risk assessment
3. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Knowledge management
Script kiddie
Tailgating
Identify the relevant systems and processes
4. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
include security responsibilities in a job description
Control risk
Control effectiveness
Applying the proper classification to the data
5. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Rule-based access control
Logon banners
Protective switch covers
Fault-tolerant computer
6. Cannot be minimized
Impractical and is often cost-prohibitive
Threat assessment
Inherent risk
Gap analysis
7. Awareness - training and physical security defenses.
Examples of containment defenses
Lack of change management
Defining high-level business security requirements
Protective switch covers
8. Needs to define the access rules - which is troublesome and error prone in large organizations.
Annually or whenever there is a significant change
Get senior management onboard
Total cost of ownership (TCO)
Rule-based access control
9. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
10. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Prioritization
Decentralization
Normalization
Proficiency testing
11. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Information contained on the equipment
Deeper level of analysis
Properly aligned with business goals and objectives
Residual risk would be reduced by a greater amount
12. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Cross-site scripting attacks
Security baselines
Data classification
Performing a risk assessment
13. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
What happened and how the breach was resolved
Continuous monitoring control initiatives
Process of introducing changes to systems
Regular review of access control lists
14. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Is willing to accept
Encryption of the hard disks
Total cost of ownership (TCO)
Virus detection
15. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Virus detection
Transferred risk
All personnel
Defining and ratifying the classification structure of information assets
16. By definition are not previously known and therefore are undetectable.
Normalization
Virus detection
What happened and how the breach was resolved
0-day vulnerabilities
17. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Residual risk would be reduced by a greater amount
Security awareness training for all employees
Equal error rate (EER)
Normalization
18. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Spoofing attacks
Trusted source
Virus
Acceptable use policies
19. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
People
Script kiddie
All personnel
Defining and ratifying the classification structure of information assets
20. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Conduct a risk assessment
The authentication process is broken
Properly aligned with business goals and objectives
Resource dependency assessment
21. The information security manager needs to prioritize the controls based on ________________________.
Exceptions to policy
Risk management and the requirements of the organization
Creation of a business continuity plan
Retention of business records
22. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
The board of directors and senior management
Gain unauthorized access to applications
Threat assessment
Compliance with the organization's information security requirements
23. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Power surge/over voltage (spike)
Nondisclosure agreement (NDA)
Biometric access control systems
The awareness and agreement of the data subjects
24. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Residual risk would be reduced by a greater amount
Safeguards over keys
Support the business objectives of the organization
The authentication process is broken
25. Used to understand the flow of one process into another.
Creation of a business continuity plan
Waterfall chart
The data custodian
Transferred risk
26. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Defining high-level business security requirements
Support the business objectives of the organization
Penetration testing
Cryptographic secure sockets layer (SSL) implementations and short key lengths
27. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Residual risk would be reduced by a greater amount
Vulnerability assessment
Resource dependency assessment
Single sign-on (SSO) product
28. Culture has a significant impact on how information security will be implemented in a ______________________.
Multinational organization
Phishing
Role-based policy
Information security manager
29. Company or person you believe will not send a virus-infect file knowingly
Security code reviews for the entire software application
Trusted source
What happened and how the breach was resolved
Data mart
30. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Nondisclosure agreement (NDA)
Rule-based access control
Overall organizational structure
The data owner
31. Has to be integrated into the requirements of every software application's design.
Information security manager
Use of security metrics
Public key infrastructure (PKI)
Encryption key management
32. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Security awareness training for all employees
Fault-tolerant computer
Exceptions to policy
Digital signatures
33. The primary role of the information security manager in the process of information classification within the organization.
Control effectiveness
Role-based access control
Security risk
Defining and ratifying the classification structure of information assets
34. Would protect against spoofing an internal address but would not provide strong authentication.
IP address packet filtering
Get senior management onboard
Fault-tolerant computer
Access control matrix
35. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
The authentication process is broken
Developing an information security baseline
Monitoring processes
Cyber extortionist
36. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Risk assessment - evaluation and impact analysis
Use of security metrics
Intrusion detection system (IDS)
Impractical and is often cost-prohibitive
37. Only valid if assets have first been identified and appropriately valued.
Security baselines
Tailgating
Annual loss expectancy (ALE)calculations
MAL wear
38. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Regulatory compliance
Single sign-on (SSO) product
Impractical and is often cost-prohibitive
Classification of assets needs
39. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Knowledge management
Regular review of access control lists
Defining and ratifying the classification structure of information assets
Centralized structure
40. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Control risk
Internal risk assessment
Threat assessment
Cyber terrorist
41. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
The awareness and agreement of the data subjects
Background checks of prospective employees
Key risk indicator (KRI) setup
Internal risk assessment
42. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Breakeven point of risk reduction and cost
Power surge/over voltage (spike)
Tie security risks to key business objectives
Risk appetite
43. ecurity design flaws require a ____________________.
Gain unauthorized access to applications
Single sign-on (SSO) product
Deeper level of analysis
Defined objectives
44. Occurs when the electrical supply drops
Patch management process
Examples of containment defenses
Undervoltage (brownout)
Regulatory compliance
45. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Its ability to reduce or eliminate business risks
Resource dependency assessment
Acceptable use policies
Conduct a risk assessment
46. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Identify the relevant systems and processes
Retention of business records
Service level agreements (SLAs)
What happened and how the breach was resolved
47. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Key controls
Role-based policy
Intrusion detection system (IDS)
Key risk indicator (KRI) setup
48. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Digital signatures
Security baselines
Inherent risk
49. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Consensus on risks and controls
Internal risk assessment
Malicious software and spyware
Asset classification
50. The best measure for preventing the unauthorized disclosure of confidential information.
Security baselines
Acceptable use policies
Prioritization
Classification of assets needs
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests